International Journal of
Computer Engineering Research

  • Abbreviation: Int. J. Comput. Eng. Res.
  • Language: English
  • ISSN: 2141-6494
  • DOI: 10.5897/IJCER
  • Start Year: 2010
  • Published Articles: 33

IJCER Articles

Modelling, simulation and optimisation of a pressure retarded osmosis power station: The co- vs. counter-current setting

July 2024

In a pressure retarded osmosis (PRO) power plant, osmosis is used to generate electric power in a 2-channel system through a semipermeable membrane. Such system can be operated in the co- or in the counter-current mode, depending on relative flow direction of the fresh and the salt (draw) water along the membrane. In order to study and compare these two cases, models which describe the variations of the various...

Author(s): O. O. Bolorunduro and I. Gasser  

Lessons learned and perspectives on constrained data collection and preparation for a predictive machine learning model applied to transportation industry in a non-digitalised environment

March 2024

Machine learning algorithms are based on qualitative and quantitative historical data, to create predictive models for shape recognition, autonomous systems, etc., using classifiers like K-Nearest Neighbors (KNN), neural-network, etc. So, treatment of data is the undisputed fuel that powers any machine learning endeavour. A standard data collection methodology would comprise a few steps as data collection, cleaning,...

Author(s): Simon Isaac KABEYA MWEPU and Patrick MUKALA,  

A practical guideline for implementing an extra security layer on an intra-cloud private MongoDB Database using encryption

March 2024

Cloud computing offers different deployment and distribution models for the outsourcing of the company’s Information Technology (IT) infrastructure (applications and data). The wide adoption of this concept does not exclude permanent and unforeseen dangers. The company loses its guarantee of the confidentiality of its most sensitive information, and many legal and security questions remain unanswered. A large...

Author(s): Kevin Tshimanga, Patrick Mukala, and Godwill Ilunga  

Security threats affecting user-data on transit in mobile banking applications: A review

September 2023

Mobile banking technology is beneficial to customers because it is convenient for conducting bank services remotely. Newer channels used for mobile banking such as mobile banking applications have been developed as an innovation that is utilized to offer traditional banking services remotely such as money withdrawals, deposits, cheque book requests among others. This saves time and costs of going to physical banking...

Author(s): Daniel Okari Orucho, Fredrick Mzee Awuor, Cyprian Ratemo and Collins Oduor  

Analysis and result of classification algorithm on email classification

July 2019

In this time, one of the most and fastest forms of communication is electronic mail or what we call e-mail. However, the increase of e-mail users has resulted in the dramatic increase of spam emails in the past few years. Spam is the use of electronic messaging systems to send bulk data. In this paper, e-mail data were classified as ham email and spam email using supervised learning algorithms. Three different...

Author(s): Elifenesh Yitagesu Desta and Tekalign Tujo Gurmessa  

Framework for integrating fragmented information systems: Case of livestock information systems

July 2017

Information System (IS) is used for information communication. But the problem with the existing Agro-ISs is that they are not integrated. To integrate it, we need to have an integration framework. Generally, much has been done on the designing framework for IS integration. However, there are credible things which can be added to improve these frameworks. A framework can be designed in such a way that it guides users on...

Author(s): Abswaidi Ramadhani, Anael Sam and Khamisi Kalegele  

In silico study in mitochondrial and chloroplast genomes of plants

May 2016

Simple sequence repeats (SSRs) or microsatellites constitute a countable portion of genomes. However, the significance of SSRs in organelle genomes has not been completely understood. The availability of organelle genome sequences allows us to understand the organization of SSRs in their genic and intergenic regions. In the current study, the mitochondrial and chloroplast genomes of different taxa of plants were...

Author(s): G. V. Padma Raju, P. Srinivasa Rao, V. Chandra Sekhar and C. Someswara Rao  

Issues in a transactional database emanating from data warehouse project

February 2016

When a data warehouse (DW) is built, typical extraction, transformation, and loading operations are made, including cleaning tasks of the data, conflicts resolution, inconsistencies identification, and constrains checking, among others. In this work, two databases (DB) were combined to obtain indexes approved and failing course in basic sciences area (Mathematics, Physics, Chemistry) of the Institute of Technology of...

Author(s): José A. Z. M., Beatriz R. R., Hugo de la R. C. and Patricia R. A.  

Real-time operating system (RTOS) with application to play models

October 2014

It is very important to improve the design of the real-time operating system (RTOS) especially if we want to use it in some special devices. Numerous researches have accepted conventional RTOS as being the customary approach for designing devices used by children. This is because these are able to facilitate the implementation different criteria such as clustering, stability and alternate programs. In this paper,...

Author(s): Hiba Shahid, Wadee Alhalabi and John Reif

The comparison of time division multiple access (TDMA) (global system for mobile communication, GSM) and wideband-code division multiple access (W-CDMA) (third generation, 3G) system based on their modulation techniques

July 2014

Mobile network communication system offers the users with seamless communication and this has caused wireless communication to increasingly become the preferred method of carrying multimedia traffic or messages such as voice, video, images, and data files. Time division multiple access (TDMA) is the multiple access scheme used in global system for mobile communication (GSM), while third generation (3G) system uses...

Author(s): Olusanya Olamide O. and Ogunseye Abiodun A.

Simulation analysis of proactive, reactive and hybrid routing protocols in mobile ad hoc network using Qualnet simulator 5.0.2

November 2012

  Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a wired backbone network. All nodes are mobile and can be connected dynamically in an arbitrary manner. There is no static infrastructure such as base station. All nodes of these networks behave as routers and take part in discovery...

Author(s): Nitin Arora and Suresh Kumar

An open source Geographic Information System (GIS) approach to water supply management, distribution and billing

November 2012

  In this work a comprehensive solution for the Gatanga Water Trust (GWT) has been developed to assist it in managing its water supply and distribution. The solution comprises two subcomponents: a mapping component and a billing component which are tightly coupled together. The proposed system uses stable open source products for the mapping component and the database. At present the GWT uses outdated maps and...

Author(s): David Ndegwa Kuria, Douglas Engoke Musiega, Moses Murimi Ngigi and Simon Kibue Ngugi

New Holder-type inequalities for the Tracy-Singh and Khatri-Rao products of positive matrices

May 2012

  Recently, authors established a number of inequalities involving Khatri-Rao product of two positive matrices. Here, in this paper, the results are established in three ways. First, we find new Holder-type inequalities for Tracy-Singh and Khatri-Rao products of positive semi-definite matrices. Secondly, the results are extended to provide estimates of sums of the Khatri-Rao and Tracy-Singh products of any...

Author(s): Zeyad AL-Zhour

Design and simulation of an SMS driven microcontroller for home automation using proteus software

May 2012

  Technology has moved from a level at which a user is always present in a place before he/she can control or do anything at the place. Imagine what television used to be before the inception of remote control. With the inception of remote control, the television can be controlled while lying on the bed or sitting down on the chair. You do not have to move towards it and press the button on it before you can...

Author(s): Olusanya O. Olamide and Ayeni O. A. Joshua

High performance efficiency of distributed optical fiber Raman amplifiers for different pumping configurations in different fiber cable schemes

April 2012

  Fiber Raman amplifiers (FRAs) are attractive for ultra wide dense wavelength division multiplexing (UW-DWDM) transmission systems due to their advantages of broad amplification bandwidth and flexible central wavelength. With recent developments of optical pump sources with high power near 1.4 μm wavelength and highly nonlinear fiber having a peak effective Raman gain coefficient, more than ten times that...

Author(s): Abd El–Naser A. Mohamed, Ahmed Nabih Zaki Rashed and Mahmoud M. A. Eid

Predicting shelf life of dairy product by using artificial neural networks (ANN) and statistical computerized methods

April 2012

Artificial neural networks (ANN) have been developed as generalizations of mathematical models of biological nervous systems. Generalized regression (GR) and multiple linear regression (MLR) models for shelf life prediction of dairy product were developed. Results of both the models were evaluated with three types of prediction performance measures viz., mean square error, root mean square error and...

Author(s): Sumit Goyal and Gyanendra Kumar Goyal

Fast matrix multiplication techniques based on the Adleman-Lipton model

January 2012

  On distributed memory electronic computers, the implementation and association of fast parallel matrix multiplication algorithms has yielded astounding results and insights. In this discourse, we use the tools of molecular biology to demonstrate the theoretical encoding of Strassen’s fast matrix multiplication algorithm with DNA based on an n-moduli set in the residue number system, thereby...

Author(s): Aran Nayebi

A review on advances in iris recognition methods

January 2012

Iris recognition is one of the most accurate identity verification systems. Since its initial introduction by J. Daughman, many methods have been proposed to enhance the performance. We present an overview of the latest research on iris recognition by categorizing the research in four groups outlined as localization, segmentation, coding and recognition. We present the latest developments explaining advances to solve...

Author(s): Fuad .M. Alkoot

Managing distribution of national examinations using geospatial technologies: A case study of Pumwani and Central divisions

November 2011

Author(s): David Ndegwa Kuria, Moses Murimi Ngigi, Josephine Wanjiru Wanjiku and Rachel Kavutha Kasumuni

Cross layer based miss detection ratio under variable rate for intrusion detection in WLAN

November 2011

The emphasis for the use of wireless LAN in industry is on robustness, reliability and security. Almost any given single secruity mechanism (such as MAC filtering) alone may be easily overcome by attackers. However, proper configuration and implemetation of the maximum possible security mechanism must be used to form a multiple security layers, to provide the best possible wireless protection. The present paper...

Author(s): Ravneet Kaur

A least square approach to analyze usage data for effective web personalization

October 2011

Web server logs have abundant information about the nature of users accessing it. The analysis of the user’s current interest based on the navigational behavior may help the organizations to guide the users in their browsing activity and obtain relevant information in a shorter span of time (Sumathi and Padmaja, 2010). Web usage mining is used to discover interesting user navigation patterns and can be applied to...

Author(s): S. S. Patil

A study of indoor positioning by using trigonometric and weight centroid localization techniques

October 2011

An indoor positioning system was developed to provide a fast and easy determination of unknown position coordinates. Wireless sensor nodes (WSN) are employed in a test area. Trigonometry techniques were employed to determine the position of the unknown objects by employing numerical analysis techniques on received signal link quality indicator (LQI) values. The distances between the unknown object position and the WSNs...

Author(s): Hakan Koyuncu and Shuang Hua Yang

Investigation in the deployment of a geographic information system

September 2011

  After a presentation of the cereal activities in Tunisia, we present a systemic analysis of project of deployment of a geographic information system (GIS). This analysis is based on the objective oriented project planning (OOPP) method. The exploitation of the systemic analysis method enables us not only to analysis and to identify the information of the cereal activities but also to lead to an efficient...

Author(s): M. N. Lakhoua

A shift-add algorithm for computing Bezier curves

April 2011

  A shift-add algorithm based on coordinate rotation digital computer algorithm for computing Bezier curves was presented in this paper. This algorithm can be implemented in basic computing system (which deals only with shift, add and logical operations) which exists in many areas. Convergence of the algorithm was proved. Error estimation was analyzed. A numerical experiment was carried out to validate...

Author(s): GU  Feng

Efficient power savings in wireless sensor networks with network coding and overhearing avoidance

March 2011

Author(s): Hnin Yu Shwe and Xiaohong Jiang

Hidden markov model based Arabic morphological analyzer

March 2011

  Natural language processing tasks includes summarization, machine translation, question understanding, part of speech tagging, etc. In order to achieve those tasks, a proper language representation must be defined. Roots and stems are considered as representations for some of those systems. A word needs to be processed to extract its root or stem. This paper presents a new technique that extracts word...

Author(s): A. F. Alajmi, E. M. Saad and M. H. Awadalla

Towards auto-configuring routing protocols for wireless ad-hoc networks

March 2011

  The importance of wireless ad-hoc networks in community and commercial connectivity cannot be underestimated because of the benefits associated with these networks. Self-organization will minimize the need for manual configuration. In essence, self-organization provides an out-of-the-box functionality such that very little technical expertise is required to setup a network. Providing unique IP addresses...

Author(s): M. B. Mutanga, P. Mudali and M. O. Adigun

Quality of service constrained task mapping and scheduling algorithm for wireless sensor networks

February 2011

Blind Signal Separation is the task of separating signals when only their mixtures are observed. Recently, Independent Component Analysis has become a favorite method of researchers for attacking this problem. We propose a new score function based on Generalized Laplace Distribution for the problem of blind signal separation for supergaussian and subgaussian. To estimate the parameters of such score function we used...

Author(s): Medhat H. A. Awadalla and Rania R. Darwish

Blind signal separation based on generalized Laplace distribution

February 2011

Blind Signal Separation is the task of separating signals when only their mixtures are observed. Recently, Independent Component Analysis has become a favorite method of researchers for attacking this problem. We propose a new score function based on Generalized Laplace Distribution for the problem of blind signal separation for supergaussian and subgaussian. To estimate the parameters of such score function we used...

Author(s): M. EL-Sayed Waheed, Osama Abdo Mohamed and M. E. Abd El-Aziz

Optimized mask selection for person identification and camera distance measurement based on interocular distance

April 2010

This paper presents a multi-resolution masks based pattern matching method for person identification. The system is commenced with the construction of multi-resolution mask cluster pyramid, where the mask size is chosen depending on the distance between two eyes, computed from the detected face. Experimental results show the effectiveness of the system with significantly higher precision, recall rates and matching...

Author(s): Khandaker Abir Rahman, Shafaeat Hossain, Al-Amin Bhuiyan, Tao Zhang, Md. Hasanuzzaman and H. Ueno

A survey of agent-oriented software engineering paradigm: Towards its industrial acceptance

April 2010

Agent-oriented software engineering (AOSE) paradigm represents an interesting means of analyzing, designing and building complex software systems quite suitable to new software development requirements. Many scientific researches have been focused on this paradigm, yet its current state still reports relative lack of industrial acceptance compared to others. As a survey of AOSE paradigm, this paper outlines the overall...

Author(s): O. Zohreh Akbari

Using the OOPP method to analyze complex industrial systems

March 2010

The aim of this paper is to propose a methodology for the analysis and modeling of complex industrial systems and to validate it through a case study. In fact, an effective management of a complex industrial system can be only in systems whose activities are synchronized and enabling a good traceability. The development of a reliable Information System (IS) is primordial. The methodology is divided into five steps and...

Author(s): Mohamed Najeh Lakhoua, and Taieb Ben Jouida,

Modelling and simulation of electrical machines on the basis of experimental frequency response characteristics

March 2010

The mathematical models of the Asynchronous electrical machines developed on the basis of the experimental frequency-response characteristics are proposed in this paper. The latter ones are recommended for investigating the transient processes occurring at short-circuits and connections of the electrical machines to the bus bars of electrical system taking into account of their rotor speed changes.   Key...

Author(s): Abdesslem Lamari

Page 1 of 1, showing 33 records out of 33 total, starting on record 1, ending on 33