IJCER Online Submission
IJCER Paper Submission Format
Publication Charges - IJCER

Frequency: 12 issues per year
ISSN: 2250–3005 (online version)
Published by: IJCER
Call for paper...

International Journal of Computational Engineering Research

(IJCER)

 

Articles

 

Research Article  open access
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey
Laila Nassef || Reemah Alhebshi
Egypt
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 03 (March 2016)

Abstract

The rapid growth in wireless communications has contributed to a huge demand on the deployment of new wireless services in both the licensed and unlicensed frequency spectrum. Cognitive Radio Networks (CRNs) is a recently emerging paradigm that aim to opportunistically access the intermittent periods of unoccupied frequency bands and therefore increasing the spectral efficiency. Unlike conventional radios, cognitive radios can intelligently adjust their transmission/reception parameters based on the interaction with the environment and find the best available spectrum bands to use. CRNs rely on cooperation for much of their functionality to make network more efficient. However, due to the distributed nature of cooperative spectrum sensing, the network is vulnerable to new types of security threats. The current spectrum sensing methods do not provide security mechanism to mitigate against these attacks. Traditional security solutions for non-cognitive wireless networks do not work well when they are confronted with these new attacks. Furthermore, the security mechanisms proposed for cognitive radio ad hoc networks are not applicable for resource constrained cognitive radio sensor networks. These present considerable obstacles to development of a security mechanism that can defend against such attacks. This paper investigates threats and defense mechanism applicable for cognitive radio sensor networks to use the proposed guidelines for future development of a security mechanism for cognitive radio sensor networks.

Keywords: Cognitive Radio Networks (CRNs), Dynamic Spectrum Access (DSA), Cognitive Radio Sensor Networks (CRSNs), Security mechanism

Research Article  open access
A survey on multiple access technologies beyond fourth generation wireless communication system
S.Chiranjeevi Reddy || K Ramprasad || ReddiBasha G
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 03 (March 2016)

Abstract

The future of mobile wireless communication networks will include existing 3rd generation, 4th generation 5th generation,6th generation (with very high data rates Quality of Service (QoS) and service applications) and 7th generation (with space roaming). Mobile and wireless networks have made tremendous growth in the last fifteen years. The rapid improvement of the mobile generations was for the purpose of supporting as many mobile devices as possible that could benefit the users at anytime and anywhere in terms of common practical applications such as internet access, video-on-demand, video conferencing system and many more applications. This paper is focused on the specifications of future generations and latest technologies to be used in future wireless mobile communication networks like MIMO, OFDM, OFDMA, Massive MIMO, LTE, LTE-A.

Keywords: TDMA, FDMA, TDD, FDD, MIMO, MU MIMO, Massive MIMO, LTE, LTE-A

Research Article  open access
The Parallel Architecture Approach, Single Program Multiple Data (Spmd) Implementation on Clusters of Terminals Using Java Rmi
Sudhir Kumar Meesala|| Dr. Pabitra Mohan Khilar || Dr. A. K. Shrivastava
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 03 (March 2016)

Abstract

The Complexity Of Computation Computer Power Is Unexpectedly Increasing Day By Day. Today's Hight Level Computer And Its High Level Utility Is Already Effected Each And Every Part Of Of Our Real Life. We All Know That Computer Power Is Effected From Astrophysics To Rural Areas And It Covers All Internal Subareas Of Each And Every Organization Either It Is A Related National Level Government Project Or International Level Projects. Many Scientific, Economic, And Research Areas Need A Specific Power To Solve Their Unsolved, Large And Complex Problems, But Maximum Solution Are Highly Economic Effective And Expensive. The Numeric Simulation Of Complex Systems Like Molecular Biology , Weather Forecast, Climate Modeling, Circuit Design, Biometric , Re-Engineering, Recycling Engineering And Many More Are Some Of Such Problems. There Are Many Approaches To Solve Them. But Tow Major Effective Solutions Are Either An Expensive Parallel Supercomputer Has To Be Used [First], Or The Computer Power Of Workstations In A Net Can Be Bundle To Computer The Task Distributed [Second]. The Second Approach Has The Advantage That We Use The Available Hardware Cost-Effective. This Paper Describes The Architecture Of A Heterogeneous, Concurrent, And Distributed System, Which Can Be Used For Solving Large Computational Problems. Here We Present The Basic Solution By Single Program Stream And Multiple Data Stream(SPMD) Architecture For Solving Large Complex Problem. We Present A Concurrent Tasks Distributed Application For Solving Complex Computational Tasks In Parallel. The Design Process Is Parallel Processing Implementation On Clusters Of Terminals Using Java RMI.

Keywords: Single Program Multiple Data(SPMD), Remote Method Invocation(RMI), Parallel Processing, Distributed Technology, Molecular Biology , Weather Forecast, Climate Modeling, Circuit Design, Biometric , Re-Engineering, Recycling Engineering

Research Article  open access
Maintenance and Performance Analysis of Draglines Used In Mines
D. Vidyasagar || Dinkar B. Kishorilal
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 03 (March 2016)

Abstract

A Dragline Is Surface Mining Equipment Which Is Used To Extract Coal By Removing Overburden. Its Performance Depends Upon The Maintainability; Availability And Reliability Characteristics Of The System. For Improving The Performance Of Draglines By Decreasing The Cycle Time, Ideal Time And Upgrade The Maintenance Strategies. Failures in Any Component Of Dragline And Improper Maintenance Could Cause Entire System To Cease. The Objective Is To Study The Performance And Maintenance Of Dragline. This Paper Also States That Immediate Improvement Has To Be Taken For Standards Of Dragline Performance.

Keywords: Dragline, Maintenance of Dragline, Availability and Utilization Factor, Major


Research Article  open access
Automation of Wheelchair Using Iris Movement
Ashwini A. Nashte || Prof. S. S. Savkare|| Prof. S. G. Kole
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 03 (March 2016)

Abstract

We Generate The Digital Data. Then This Digital Data Is Sent To The Psoc Microcontroller For The Further Processing. We Have Also Provided The Provision For Obstacle Detection By Using Ir Sensor. It Will Help Us To Stop The Chair At Predefined Distance After Sensing The Obstacle. We Have To Recognize The Iris Movement And Move The Chair According To The Location Of Iris In Left, Right, Forward And To Stop The Chair.

Keywords: Disable People, Electronic Wheelchair, Electronic Wheelchair Using Image Analysis Technique, Eye Movement, Finding Pupil Location, Ir Sensor, Psoc Module

Research Article  open access
Textile application in bio-potential recording used for medicinal purposes: an overview
Dr. Tasnim N. Shaikh || Dr. S. B. Chaudhari || Dr. B. H. Patel || Ms. Megha Patel
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 03 (March 2016)

Abstract

Bio-potential signals in the form of eeg and ecg are the two critical health indicators that are directly suited for long-term monitoring using bio-sensors. The conventional wet adhesive ag/agcl electrodes are the most commonly and commercially used in clinical applications today for these purposes. They provide an excellent signal but are cumbersome and irritating while operated with gels, adhesives and even causes certain skin problems when come in direct contact with the outer dry layer of skin. Invention of textile electrode is the outcome of the search for suitable option for this classical technique. Various textile structured electrodes developed in the course have shown a bright sign of improvement in work practices. Successful development and commercialization of an interactive textile based bio-potential device can leave a profound influence on health monitoring system in the society. This paper extends platform for the critical theoretical review of overall developments took place in textile structured electrodes used for long term monitoring of cardiac issues.

Keywords: Electrocardiogram, Bio-Potential Signals, Ag/Agcl Electrodes, Textile Electrodes

Research Article  open access
Double feedback technique for reduction of Noise LNA with gain enhancement
K. RAJU M.Tech || R.SIREESHA M.Tech || K.VIJAY KUMAR M.Tech
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 03 (March 2016)

Abstract

In this paper we present a balun low noise amplifier (LNA) in which the gain is boosted by using a double feedback structure. The circuit is based on a conventional balun LNA with noise and distortion cancelation. The LNA is based on the combination of a common-gate (CG) stage and common-source (CS) stage. We propose to replace the load resistors by active loads, which can be used to implement local feedback loops (in the CG and CS stages). This will boost the gain and reduce the noise figure (NF). Simulation results, with a 130nm CMOS technology, show that the gain is 24dB and the NF is less than 2.7dB. The total power dissipation is only 5.4mW (since no extra blocks are required), leading to a figure-of-merit (FOM) of 3.8mW-1 using a nominal 1.2V supply. Measurement results are presented for the proposed DFBLNA included in a receiver front-end for biomedical applications (ISM and WMTS).

Keywords: RF front-end receivers CMOS LNAs Noise reduction Wideband LNA

Research Article  open access
Market Challenges for Pumped Storage Hydropower Plants
Milan Ćalović || Dejan Mandić || Miodrag Mesarović
Serbia
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 03 (March 2016)

Abstract

For power system development planning, a thorough valuation of each of its components is carried out with an objective to improve the system reliability and economy. This paper deals with energy storage technologies with particular emphasis placed on the pumped storage hydropower plants (PSHs). For the long-term development planning of a system with different generating facilities, PSHs still play the major role in the implementation of intermittent renewable energy sources into a future generation mix. For planning of a generation mix with PSHs we use the concept of "Levelized Cost of Electricity" (LCoE) to compare the economic indicators of a system in order to make a fair and unbiased selection of new plants intended to cover customer demands. Being based on the monetary indicators, the LCoE concept is able to help in making investment decisions in view of technology and size of any new generating sources proposed for a defined time horizon. Owing to their excellent operational flexibility PSHs may also be good players on the electricity markets, offering both, capacity and energy services.

Keywords: Energy storage technologies, Flexibility, Generation mix, Levelised cost of electricity, Market profitability, Net present value, Power generation cost, Renewable energy sources, Security of supply, Selling prices

Research Article  open access
An Comprehensive Study of Big Data Environment and its Challenges.
Saravanan.C
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 03 (March 2016)

Abstract

Big Data is a data analysis methodology enabled by recent advances in technologies and Architecture. Big data is a massive volume of both structured and unstructured data, which is so large that it's difficult to process with traditional database and software techniques. This paper provides insight to Big data and discusses its nature, definition that include such features as Volume, Velocity, and Variety .This paper also provides insight to source of big data generation, tools available for processing large volume of variety of data, applications of big data and challenges involved in handling big data .

Keywords: Big data, Challenges, Evolution, Structured data, unstructured data, Traditional database.

Research Article  open access
Experimental Investigation of Multi Aerofoil Configurations Using Propeller Test Rig
Arun Prakash.J ||Vishnu.V || Sathish Kumar || Sanjay Kumar.G
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 03 (March 2016)

Abstract

This paper briefs about the performance test on multi aero foil configuration on propeller test rig. They will be then tested for various speed and blade angles using propeller test rig. The result are compared and studied with the convectional airfoil configurations. In future Such Aerofoils can be used for wind Mills for producing the high Voltage Power.












Articles

 

Research Article  open access
Targeted Visual Content Recognition Using Multi-Layer Perceptron Neural Network
Meer Tayyab Ali Moosavi || RafiahTabassum|| Perisetti Sravani ||Panuganti Devi Mounika ||Lingam Harish Babu ||Dr.P.S.Suhasini || P.Venkata Ganapathi
India
Paper Indexed : : 03.3005/xxxxxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 03 (March 2016)

Abstract

Visual Content Recognition has become an attractive research oriented field of computer vision and machine learning for the last few decades. The focus of this work is monument recognition. Imagesof significant locations captured and maintainedas data bases can be used by the travelers before visiting the places. They can use images of a famous building to know the description of the building. In all these applications, the visual content recognition plays a key role. Humans can learn the contents of the images and quickly identify them by seeing again. In this paper we present a constructive training algorithm for Multi-Layer Perceptron Neural Network (MLPNN) applied to a set of targeted object recognition applications. The target set consists of famous monuments in India for travel guide applications. The training data set (TDS) consists 3000 images. The Gist features are extracted for the images. These are given to the neural network during training phase.The mean square error (MSE) on the training data is computed and used as metric to adjust the weights of the neural network,using back propagation algorithm. In the constructive learning, if the MSE is less than a predefined value, the number of hidden neurons is increased. Input patterns are trained incrementally until all patterns of TDS are presented and learned. The parameters or weights obtained during the training phase are used in the testing phase, in which new untrained images are given to the neural network for recognition. If the test image is recognized, the details of the image will also be displayed. The performance accuracy of this method is found to be 95%

Keywords:Visual content recognition, Multi-Layer Perceptron Neural Network, Gist feature

 

Research Article  open access
Minimizing Localization Error and Ensure Security of Dvhop Approch
Kantveer || Priyanka Arora
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 03 (March 2016)

Abstract

In case of wireless sensor network there exist problem of determining the nodes which are symmetrical to each other. The nodes which are symmetrical and are at lesser distance are selected for data transfer. This identification of the distance between nodes is known as localization. In the proposed paper work on DVHOP is done. The DVHOP is the distance vector routing based protocol which is used to indicate whether there exist a path from source to destination or not. The malicious node can also be present which can take over the actual node causing problems in the transfer process. The most common attack which results from this will be DDOS attack. This will result in the duplication of the information and will cause traffic jamming. DVHOP with random key is used to handle DDOS attack.

Keywords:----

Research Article  open access
Ontology-Based Approach for Knowledge Retrieval in Al-Quran Holy Book
Azman Ta'a || Qusay Abdullah Abed || Bashah Mat Ali || Muhammad Ahmad
Malaysia
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 03 (March 2016)

Abstract

Knowledge of Al-Quran is gathered through the interpretation of Division (Juz), Chapter (Surah), and Verse (Ayah) from the representation of ontology structure. It requires a searching method, which can find true knowledge of Al-Quran. However, current searching approaches in Al-Quran ontology face several fundamental problems, such as irrelevant and inaccuracy for producing true concepts and verses of knowledge. Moreover, current approaches used conventional methods such as taxonomy, hierarchy, or tree structure, which only define the concepts of knowledge without linking to a relevant theme of knowledge. The themes of background knowledge are important to provide another possibility of knowledge explanation and to ensure the results from the searching were selected the true meaning of Al-Quran knowledge. Therefore, the main aims of this paper are to demonstrate the searching method for retrieving the relevant and accurate verses in Al-Quran by using ontology approach.

Keywords: Knowledge Retrieval, Knowledge Representation, Ontology, Semantic Web, RDF/OWL Framework, Holy Book, Al-Quran

Research Article  open access
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
Ibrahim Aziz Patwekar
China
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 03 (March 2016)

Abstract

The security mechanism are not used directly in wireless sensor networks compare to wired networks, there is no user control and insufficient energy resources. In wireless environment, proposing the scheme of detection of distributed sensor cloning attacks and Zero knowledge protocols (ZKP) are used to verifying authenticity of the sender sensor nodes. Cloning attack is concentrate on by attaching fingerprint which is unique that depends on the set of neighboring nodes and itself. Every message contains a finger print which sensor node sends.ZKP is used to avoid man in the middle attack and reply attacks from the important cryptographic information in wireless networks.

Keywords: clone attack, man in middle attack, replay attack, zero knowledge protocol, WSN.

Research Article  open access
Lightning Acquisition and Processing On Sensor Node Using NI cRIO
Harshit Devakumar || Ajay Khandare || Dr.Prof. M.S. Panse
Matunga
Paper Indexed : : 03.3005/xxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 03 (March 2016)

Abstract

In this paper, we propose a digital design implementation for continuous real time data acquisition in case of a lightning event. The proposed system is capable of acquiring the lightning data at the rate of 1 MS/s on the FPGA. The system is also capable of providing very accurate timestamps in microsecond's resolution. The data logging is carried out continuously on the PC using the TDMS file format with each and every sample being timestamped. The entire acquisition design is being implemented using NI cRIO hardware. The components of this assembly consist of the cRIO-9030 chassis , which contains a Kintex-7 FPGA , NI 9223 which is a sixteen bit ADC module, along with the NI 9467 which is a GPS module with the receiver antenna, it is used for accurate timestamping. The analog front end has been already developed, it comprises of an anti aliasing filter ,Low Noise Amplifiers and level shifters which can provide the signal with necessary gain to be processed by the digital section. The output of the analog front end is then fed to the NI 9223 four channel ADC module for sampling at 1MS/s. The samples along with their respective timestamps would be processed for identifying probable lightning data chunks on a preliminary basis which would then be transmitted over an Ethernet interface to the Central Processing system using Network Streams. The proposed digital design implementation for the entire acquisition system on the FPGA is briefly discussed in this paper.

Keywords:ADC, Amplitude Thresholding, Cloud To Ground Lightning, DMA FIFO, Rise Time Detection, Sferic Detection, Time Of Arrival.

Research Article  open access
Detection of Various Attacks using Zero Knowledge Protocol in Wireless Security
Ibrahim Aziz Patwekar || Dr. V. C. Kotak
India
Paper Indexed : : 03.3005/xxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 03 (March 2016)

Abstract

The security mechanism are not used directly in wireless sensor networks compare to wired networks, there is no user control and insufficient energy resources. In wireless environment, proposing the scheme of detection of distributed sensor cloning attacks and Zero knowledge protocols (ZKP) are used to verifying authenticity of the sender sensor nodes. Cloning attack is concentrate on by attaching fingerprint which is unique that depends on the set of neighboring nodes and itself. Every message contains a finger print which sensor node sends.ZKP is used to avoid man in the middle attack and reply attacks from the important cryptographic information in wireless networks

Keywords:clone attack, man in middle attack, replay attack, zero knowledge protocol, WSN.

Research Article  open access
An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced Encryption Standard
Mary James || Deepa S Kumar
India
Paper Indexed : : 03.3005/xxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 03 (March 2016)

Abstract

This paper presents a high speed, FPGA implementation of AES Encryption and Decryption (acronym for Advance Encryption Standard, also known as Rijndael Algorithm) in which the different steps of AES is applied in a parallel manner. This implementation can reduce the latency in which the process of implementation is reduced in a drastic manner. The paper deals with a comparison of the normal implementation of steps of AES and the parallel implementation. Inorder to increase the throughput of the AES encryption process the latency of the AES process should be reduced. Among Add Round Key, Sub Bytes, Shift Rows and Mix Columns, Sub Bytes and Mix Columns produce more latency. The execution delay of Mix Columns results in 60 percent of the total latency. Therefore Parallel Mix Columns is used inorder to reduce the latency. In this the block computes one column at a time such that the four columns are executed at the same time rather than each byte executing at a time. In Parallel Sub Bytes, four columns are executed at the same time rather than each byte executing at a time, this reduces the latency. Encryption is the process of encoding information so it cannot be read by hackers. The information is encrypted using algorithms and is converted into unreadable form, called cipher text. The authorized person will decode the information using decryption algorithms. The cryptography algorithms are of three types -symmetric cryptography (using 1 key for encryption/decryption), asymmetric cryptography (using 2 different keys for encryption/decryption), and cryptographic hash functions using no keys (the key is not a separate input but is mixed with the data).

Keywords:AES ,Lightweight Cryptography,Parallel Mixcolumn, Parallel Subbytes, Key expansion, Shift rows, FPGA.

Research Article  open access
Robotic Soldier with EM Gun using Bluetooth Module
AshteshDivakar ||Prathamesh Rane ||Rahul Bane
India
Paper Indexed : : 03.3005/xxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 03 (March 2016)

Abstract

Need for security is growing day by day due to enormous development in the field of technology, but man wants to achieve this security at the minimum cost and minimum risk to human life. This is the factor which has encouraged us to develop this project which can achieve security at minimum risk to human life and at minimum cost. Here instead of exposing the soldier to do the hazardous job such as dangerous gas or hostile environment detection we have designed a machine which will do the same job more efficiently. This robot will be self-sufficient to sense the temperature of surrounding, and detecting if any obstacles are there at a certain distance depends on that robot guiding itself using the efficient algorithms and proper sensors.

Keywords:Bluetooth module hc-05 ,DC Motor ,Microcontroller– AT89S52 ,MAX 232.

Research Article  open access
A NOVEL BOOTH WALLACE MULTIPLIER FOR DSP APPLICATIONS
Juny Mary Jose || Reen Paul
India
Paper Indexed : : 03.3005/xxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 03 (March 2016)

Abstract

Multipliers have great importance in both digital signal processors and microprocessors. So designing a high speed multiplier is the need of the hour. There are several methods available to speed up a multiplier. This paper incorporates pipelining technique to a multiplier for improving its performance. The multiplier under consideration is Booth Wallace multiplier. A comparison between pipelined and non-pipelined booth Wallace multiplier in terms of delay and area utilization were also done in this work. Verilog HDL has been used for the coding. Xilinx ISE 14.2 design suite is used for synthesizing the code.

Keywords:Pipelining, Booth, Wallace, Xilinx, Delay, Verilog, Radix

Research Article  open access
On intuitionistic fuzzy 𝜷 generalized closed sets
Saranya M|| Jayanthi D
India
Paper Indexed : : 03.3005/xxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 03 (March 2016)

Abstract

In this paper, we have introduced the notion of intuitionistic fuzzy 𝛽 generalized closed sets, and investigated some of their properties and characterizations

Keywords:Intuitionistic fuzzy topology, intuitionistic fuzzy𝛽closed sets, intuitionistic fuzzy 𝛽 generalized closed sets..