Ethical Guidelines for Publication in International Journal of Computational Engineering and Management

(Our ethical guidelines are based on Committee on Publication Ethics (COPE) and existing Elsevier policies)

International Journal of Computational Engineering and Management (IJCEM) follows the standard for Ethics and Publication Malpractice set by the Committee on Publication Ethics (COPE). IJCEM Research Foundation Trust as publisher of IJCEM. IJCEM recognizes its ethical and other responsibilities.


 Responsibities of Authors

 Reporting standards

Authors of reports of original research should present an accurate account of the work performed. Data should be represented accurately in the article/research paper. An article/research paper should contain sufficient detail and references to permit others to replicate the work. Fraudulent or deliberately inaccurate statements constitute unethical behaviour and are unacceptable.

 Data Access and Retention

Authors are asked to provide the raw data in connection with a article/research paper for editorial review, and should be prepared to provide public access to such data if practicable, and should in any event be prepared to retain such data for a reasonable time after publication.

 Originality and Plagiarism

The authors are sole responsible about originality of their work and if authors have used the work and/or words of others that these should have been appropriately cited or quoted.

 Multiple, Redundant or Concurrent Publication

In general an author should not publish manuscripts describing essentially the same research in more than one journal or primary publication. Submitting the same manuscript to more than one journal concurrently constitutes unethical publishing behaviour and is unacceptable

 Acknowledgement of Sources

Proper acknowledgment of the work of others must always be given. Authors should cite publications that have been influential in determining the nature of the reported work. Information obtained privately, as in conversation, correspondence, or discussion with third parties, must not be used or reported without explicit, written permission from the source.

 Authorship of the Paper

Authorship should be limited to those who have made a significant contribution to the conception, design, execution, or interpretation of the reported study. All those who have made significant contributions should be listed as co-authors. Where there are others who have participated in certain substantive aspects of the research project, they should be acknowledged or listed as contributors.

The corresponding author should ensure that all appropriate co-authors and no inappropriate co-authors are included on the paper, and that all co-authors have seen and approved the final version of the paper and have agreed to its submission for publication.

 Hazards and Human or Animal Subjects

If the work involves chemicals, procedures or equipment that have any unusual hazards inherent in their use, the author must clearly identify these in the manuscript.

 Disclosure and Conflicts of Interest

All authors should disclose in their manuscript any financial or other substantive conflict of interest that might be construed to influence the results or interpretation of their manuscript. All sources of financial support for the project should be disclosed.

 Fundamental errors in published works

When an author discovers a significant error or inaccuracy in his/her own published work, it is the author’s obligation to promptly notify the journal editor or publisher and cooperate with the editor to retract or correct the paper.


Responsibities of Reviewers

Contribution to editorial decisions

Peer review assists the editor of IJCEM in making editorial decisions and through the editorial communications with the author may also assist the author in improving the paper. Peer review is an essential component of formal scholarly communication, and lies at the heart of the scientific method. IJCEM shares the view of many that all scholars who wish to contribute to publications have an obligation to do a fair share of reviewing.


Any selected referee who feels unqualified to review the research reported in a manuscript or knows that its prompt review will be impossible should notify the editor and excuse himself from the review process.


Any manuscripts received for review must be treated as confidential documents. They must not be shown to or discussed with others except as authorized by the editor.

Standards of objectivity

Reviews should be conducted objectively. Personal criticism of the author is inappropriate. Referees should express their views clearly with supporting arguments.

Acknowledgement of sources

Reviewers should identify relevant published work that has not been cited by the authors. Any statement that an observation, derivation, or argument had been previously reported should be accompanied by the relevant citation. A reviewer should also call to the editor's attention any substantial similarity or overlap between the manuscript under consideration and any other published paper of which they have personal knowledge.

Disclosure and conflict of interest

Unpublished materials disclosed in a submitted manuscript must not be used in a reviewer's own research without the express written consent of the author. Privileged information or ideas obtained through peer review must be kept confidential and not used for personal advantage. Reviewers should not consider manuscripts in which they have conflicts of interest resulting from competitive, collaborative, or other relationships or connections with any of the authors, companies, or institutions connected to the papers.


Publication Responsibilties of Editors

The editor of the IJCEM is responsible for deciding which of the articles/research papers submitted to the journal should be published. The editor may be guided by the policies of the journal's editorial board and constrained by such legal requirements as shall then be in force regarding libel, copyright infringement and plagiarism. The editor may confer with other editors or reviewers in making this decision.

 Fair play

An editor at any time evaluate manuscripts for their intellectual content without regard to race, gender, sexual orientation, religious belief, ethnic origin, citizenship, or political philosophy of the authors.


The editor and any editorial staff must not disclose any information about a submitted manuscript to anyone other than the corresponding author, reviewers, potential reviewers, other editorial advisers, and the publisher, as appropriate.

 Disclosure and conflicts of interest

Unpublished materials disclosed in a submitted manuscript must not be used in an editor's own research without the express written consent of the author.

Design of Low Power Wide Gates used in Register File and Tag Comparator
Isac Daimary, Mohammed Aneesh

This paper presents a low power register file and tag comparator which has a lower leakage and higher noise immunity without affecting their speed due to wide fan in gates. Increasing leakage currents combined with reduced noise margins significantly degrade the robustness of wide dynamic circuits. Using low Vth 90 nm CMOS process technology model simulation of register files and tag comparators is designed. An improvement of 20% power reduction and 2 times noise immunity is observed in the implemented register file using the proposed circuit at the same delay compared to the standard domino circuits.
Download Full Text

Design & Simulation of Triple Band Micro Strip Patch Antenna for FPV, Wi-Max and W-Lan Application
Swati Shrivastava, Abhinav Bhargava

This paper presents a Rectangular micro-strip patch antenna by cutting three horizontal slots. It is triple-band antenna, which operates at three resonant frequencies 1.2, 3.2 & 4.5GHz.Which is a new multi-band micro strip antenna, using projected antenna design and micro strip feeding at proper location we find the resultant return loss, VSWR and bandwidth. For this design of micro strip antenna we have used FR-4 substrate which has permittivity of 4.4 and thickness 1.6, loss tangent is 0.02. FEKO simulation software has used for designing and analysis. We have observed that using triple slotted patch antenna and using micro strip at centre feed, we can get better return loss, VSWR bandwidth and multiband.
Download Full Text

A Study on Impact of Advertising and Sales Promotion on Women Skin Care Consumers in the City of Jabalpur
Asiya Faisal Khan

In the era of globalisation and digitization, improved employment access, high female literacy rate and exposure to electronic media has laid a lot of importance to marketing communications in shaping the consumer buying behavior in skin care products. In this research study impact of advertising and sales promotions on consumer buying behavior in skin care products has been analysed. This paper focuses on an effort to determine consumer buying behavior through the impact of advertising and sales promotion on the purchase of skincare products by Women living in the city of Jabalpur. Questionnaires were distributed and self administered to 125 respondents. Ranking and Chi-square method was used in the study. The sample size of 125 respondents includes only women skin care users both working & non working. The findings of the study skin care indicated that there is no significant relationship between the sale and purchase of skin care products and also there is no significant relationship promotional gifts and purchase of skin care products. There is a significant elationship between the recommendation of a sales professional and purchase of skin care products. The most important factor of skin care Product advertisement to pay attention by women is Brand.

The limitation of the study was it was only done in Jabalpur. Its practical implication suggests the marketers need to design their advertising and sales promotion strategies in order to attract more and more women to purchase skin care products.
Download Full Text

Examining the Influence of Strategic Land Rehabilitation on Sustainable Entrepreneurship & Economic Development (A Case of Kilome – Kenyaland Reclamation)
Teresia Kyalo, Kellen Kiambati

This study sought to To examine the influence of land rehabilitation on sustainable economic development in Kilome, specifically studying how entrepreneurial attributes, entrepreneurial value of Kilome area resources, potential entrepreneurial initiatives and entrepreneurial systems influence sustainable economic development. Existing local empirical studies did not establish this role. Four hypotheses were investigated using a census survey of data obtained from ten (10) Community Based Organizations in “Kilome” Kenya each with a sample of ten representatives. There was 90% response rate. Regression models were used to analyze data. The findings reveal that entrepreneurial attributes, entrepreneurial value of Kilome area resources, potential entrepreneurial initiatives and entrepreneurial systems influence sustainable economic development. The implication of the study for management and entrepreneurs is to integrate different strategies to achieve better sustainable economic development.
Download Full Text

Relationship Between Stress and Quality of Worklife of School Teachers Based on Demographic Variables
Vemuri Swathi, Sudhir Reddy

The aim of this study is to investigate the differences in stress and QWL based on demographic variables such as gender, experience and the organization type. Questionnaire data was collected through simple random sampling method which is administered to 140 school teachers who are working in government and private organizations. This study revealed that there are no differences in stress and QWL among teachers based on gender and organization type. The study also revealed that there is difference between stress and QWL based on the experiences of the teachers.
Download Full Text

end faq

This post confirms my ownership of the site and that this site adheres to Google AdSense
programme policies and Terms and Conditions: ca-pub-1858423325055810

Software Effort and Cost Estimation using Software Requirement Specification
Ayman Hussein Odeh

Process of estimating the effort required for the software development process is difficult and very complicated. There are many techniques to estimate the effort and cost of producing software, this article is based on a correct reading and mathematical analysis of the software problem, extract the variables needed as input and output for the required software, and applying the Software Science Metrics on the variables and their relationship to estimate unique and used operators and operators. Finally depending on these metric calculate the size and the time and effort ... etc. expected to produce software.
Download Full Text

A Novel Message Driven Local Repair Algorithm for MANET
A. E. Narayanan, A. Vincent Jeyakumar

Mostly MANET is used for emergency situation like disaster management which has the task of supplying QoS in an effort to provide the right information to the right place at the right time. In this scenario with the capability to send and receive reliable real-time video and voice packets, the involved network must be able to provide a certain level of QoS. So that the QoS impact in the face of network failures must be minimized in MANET like temporary emergency networks. In such a situation, when an intermediate node fails the network has no built in protocol to respond to this link breakage, the connection will have to be rerouted from the source and QoS will have to be re-established. This global fault-tolerance method means the source will have to recomputed and renegotiate a new QoS path which, depending on the network size, could be costly in terms of computation and communication time necessary for path negotiation (negotiation includes implementation of the new path). In contra, the proposed fault-tolerant algorithm makes it possible for the Intermediate nodes to efficiently repair the failed connection locally and reroute the packets to the destination.
Download Full Text

Information Retrieval Configuration File Text Categorization Algorithm for Improving Business Intelligence
V. Jayaraj and V. Mahalakshmi

Globalization has changed the very face of the business nature and many innovative techniques have emerged to cater to the need of the evolving business needs. With the aid of these new technologies, the raw information is mined to extract useful meaningful data to help the business grow. Plethora of information are textual based document and, the information in most cases are stored in an unordered manner, from this unordered collection of text document, the process of extracting information or deriving knowledge is termed as Text Mining. This paper proposes an methodology to implement the text mining technology to enhance the scope of Business Intelligence. A novel algorithm named information retrieval configuration file is proposed to extract useful information from a set of documents and employs a new technique in extraction where the information gained is relevant and efficient for business needs. This paper mainly focuses on the development of a new algorithm after analyzing and comparing it with the existing algorithm like support vector machine and hidden markov model.
Download Full Text

Modeling of UPFC and DG by the Current Based Model
B. Raja Rajeswari , P. Bhaskara Prasad , P. Bala Chennaiah

This paper deals with the steady state modeling of unified power flow controller (UPFC). Since current limitations are determinant to FACTS apparatus design, the proposed current based model (CBM) assumes the current as variable, allowing easy manipulation of current restrictions in optimal power flow evaluations. The performances of current based model (CBM) and of the power injection model (PIM) are compared through a Quasi-Newton optimization approach. The performance of a medium size network with 39 busbars is studying from the point of view network having only UPFC and the network having UPFC and DG. For the Two networks active power losses, reactive power losses are compared.
Download Full Text

Bibliometric Analysis of Literature Published in Emerald Journals on Cloud Computing

The present study is based on the bibliometric analysis of publications on cloud computing appeared in the emerald journals from 2000 to 2014. The bibliographical details of each publication on a cloud computing were downloaded from the emerald website and recorded in MS-excel for calculation. This study has undertaken total 781 publications, published on cloud computing which were appeared in different journals of emerald publication. Maximum number of articles 287 (37%) contributed by single author. Majority of the contribution among the published literature to cloud computing is from Library Hi Tech News and Library Hi Tech journals respectively.
Download Full Text

end faq