IJCER Online Submission
IJCER Paper Submission Format
Publication Charges - IJCER

Frequency: 12 issues per year
ISSN: 2250–3005 (online version)
Published by: IJCER
Call for paper...

International Journal of Computational Engineering Research

(IJCER)

 

Articles

 

Research Article  open access
Behavioural Study and Analysis of a Polycrystalline Solar PV Panel under varying Temperature and Irradiance
Sujo Oommen || Adithya Ballaji || K Narayana Swamy || Ananda M H | Burri Ankaiah
..
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Research, Volume 09 ~ Issue 1 (January – 2019)

Abstract

In rural India, electricity is an essential factor when it comes to the use for household, lighting along with various agriculture operations. Places like villages where installation of electrical grids become expensive, a smart technique of using renewable energies can be used for household purposes. In this paper, simulation model of PV module was designed and constructed in MATLAB/Simulink. The PV model (I) Current – (V) Voltage characteristics and also (P) Power – (V) Voltage characteristics were performed with different temperature and irradiance values. The paper highlights the effect of temperature and irradiance change on polycrystalline PV Panel. The results were shown in this paper for the simulated system which can be use for rural villages and domestic purposes..

Keywords: ....

Research Article  open access
Photogravitational elliptical magnetic binary problem
Mohd Arif
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Research, Volume 09 ~ Issue 1 (January – 2019)

Abstract

This paper deals with the existence and linear stability of equilibrium points in the photogravitational elliptical magnetic binary problem when the bigger primary is a source of radiation . It is observed that there exists three collinear and two non-collinear equilibrium points We have found that the radiation-pressure of the primary affects the position of the equilibrium points for any combination of the parameters considered here. Further we have observed that the one collinear equilibrium point 𝐿1 is stable while the others collinear and non-collinear equilibrium points are unstable for various values of 𝜇..

Keywords: equilibrium points, elliptical magnetic binary problem, stability. AMS Subject Classification: 70F07.

Research Article  open access
Mathematical modeling on conservation and production of animal species
Namreen Rasool
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Research, Volume 09 ~ Issue 1 (January – 2019)

Abstract

In a multispecies network, the interaction of biotic and abiotic systems in both plant and animal kingdom play a key role for their stability. Most of the warm blood animals including human beings depend upon both plants and animals to meet out carbohydrates, minerals, proteins and other nutrients for their physiological and developmental performances. Thus the demand and conservation rate of both animals and plants species is one of the challenging research area in the present scenario. Human beings mostly living in cold zones, slaughter animals for food purposes to compete with the adverse cold conditions. Thus, it is imperative to study the conservation and production of animal species with optimal slaughter rates. In this direction a mathematical model has been formulated to understand the behaviour and stability of animal species under slaughtering conditions. Slaughter and Conservation rates of animal populations has been established by

Keywords: .....

Research Article  open access
Securing Multi User Authentication in Cloud Computing Using Secret Sharing
Sonali Patil
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Research, Volume 09 ~ Issue 1 (January – 2019)

Abstract

Authentication is the process of determining the truth related to the identity of a person, a software program or ensuring that the product is found to be what its labeling claims to be. There is always a great difference between the process of authentication and authorization. The authentication always tends to the process of verifying that "You are tend to be who you say you are" Where as authorization is the process to providing verification for "You are permitted to do for what you want to do", For example a person having a proper Aadhar card gives the proof indicating the identity of that particular person, The client's who authentication request is permitted, only then he/she is authorized to acquire facilities for an Indian citizen, The process of authentication can be done in different ways depending upon the requirements. The first type of authentication techniques is acceptance....

Keywords: .....