Engineering

Engineering Research Papers/Topics

Effect of Date Palm Seed Ash as a Supplementary Cementitious Material in Concrete

Abstract This study investigates the effect of Date Palm Seed Ash (DPSA) as a pozzolan on the workability, compressive strength and water absorption capacity of concrete. Temperature regulated kiln was used to burn the Date Palm Seed (DPS) into DPSA in two stages: it was first burned for eight hours at an optimum temperature of 590oC and then cooled for two days. It was again burned for three hours at an optimum temperature of 630oC for eight hours and was air cooled again for three days. The...

Early Plant Disease Detection and Recommendation Using ML CNN

Identification of the plant diseases is the key to preventing the losses in the yield and quantity of the agricultural product. Almost 70% people depend on it & shares major part of the GDP. Diseases in crops mostly on the leaves effects on the reduction of both quality and quantity of agricultural products. Perception of human eye is not so much stronger so as to observe minute variation in the infected part of leaf. In this paper, we are providing software solution to automatically detect a...

Design of Advanced Peripheral Bus for Universal Asynchronous Receiver-Transmitter

The huge progress of VLSI technology enables the integration of millions of transistor on a single chip called System on chip (SoC).The SoC uses AMBA (Advanced Microcontroller Bus Architecture) as on chip bus protocol. AMBA’s specifications define five buses/interfaces: Advanced extensible Interface (AXI), Advanced High-performance Bus (AHB), Advanced System Bus (ASB), Advanced Trace Bus (ATB), and Advanced Peripheral Bus (APB). AXI, AHB, ASB, ATB which are high performance buses used to in...

Improving Software Defect Prediction Using Cluster Undersampling

ABSTRACT Adequately learning and classifying datasets that are highly unbalanced has become one of the most challenging tasks in Data Mining and Machine Learning disciplines. Most datasets are adversely affected by the class imbalance problem due to the limited occurrence of positive examples. This phenomenon adversely affects the ability of classification algorithms to adequately learn from these data to correctly classify positive examples in new datasets. Data sampling techniques presente...

COVID-19 Virus Repellent Solution Based on the Liquid Electric Air Sanitization

Indubitably the most challenging coronavirus (Covid-19) outbreak, caused by SARS-CoV-2. With the number of Covid-19 cases now approaching millions globally so, for controlling the current infection rate, we have come up with this innovation of virus repellent electric liquid vaporizer means by vaporization of the solution which is the in-liquid form by means of electricity, which will enable the infectious virus and bacteria to be less effective also it will sometime kill the virus in a small...

Statistical Analysis of Vibration Signals for Condition Monitoring of Defects in Exhaust Fan Bearing

ABSTRACT Identification of exhaust fan bearing defects has its root foundations in the analysis of frequency modulation and sensing using mostly online techniques. Centrifugal fans are the most commonly used fans in the industry today. They are preferred to axles because they are cheaper and constructed with simplicity. They are used in wind systems in vehicles and buildings and also in delivering gas or minerals. They are suitable for industrial and air pollution processes and systems. Fa...

Fluidized Bedreactor Modelling and Simulation with Aspen Plus for Alumina (AL2O3) Production Systems

Abstract:Fluidized bed reactor is useful for heterogeneous (multiphase) reactions, separations, size enlargement, coating, and blending in chemical and pharmaceuticals industries. To develop a model and simulation of this reactor with advanced systems process engineering software (Aspen Plus). Aspen plus has the capability to simulate real factory performance, design improved plants, and intensify profitability in present plants. This modeling and simulation are applied Geldart B particle cla...

Fire Risk Assessment Of Construction Companies in Nueva Ecija

Abstract Fire safety is an important consideration in many structures and spaces because of the danger and damage that it may pose. Given so, a fire risk assessment is not often conducted on construction sites or while the building is under construction. They only assess this after the construction or before they provide an occupancy permit. Thus, this study assessed the level of fire risk of construction sites in Nueva Ecija. The study included 61 respondents all over the province. The study...

Cashew Nut Shell Liquid, A Renewable and Reliable Petro-Chemical Feedstock

ABSTRACT The physical properties of CNSL extracted by pyrolysis was studied using standard procedures. The physical properties of the CNSL studied and results obtained compared with other extraction methods (hexane extracted and decarboxylated) from literature are moisture content 4.1%, (6.40%, 3.2%), specific gravity 0.943 (0.926, 0.926) viscosity 57cp (40cp, 358cp), pH 4.5 (4.5, 5.2) and the percent composition of the CNSL compared with those from literature are cardol 27% (30%, 31% (carda...

Strategies For Optimizing Password Management Against Versatile Attacks

Managing passwords is a significant problem for most people in the modern world. Passwords are a critical part of information and network security. Passwords serve as primary authentication method to protect user accounts but a poorly chosen password, if compromised, could put the entire network at risk. Many users do not understand why good passwords and password management are important for information systems. “We’re secure! We use passwords!” How many of us have heard this claim? Or...

The Role Of Drought On Agricultural Production; A Case Study Of Fafi District In North Eastern, Kenya

ABSTRACT A case study of the role of drought on agricultural production was conducted among small-scale farmers in the Bun division of Fafi district in Northeastern Kenya, to determine how drought affects the agricultural production, causes and different types of drought that exists and what can be done to minimize the impacts of drought in the study area. Achieving these objectives would help increase the agricultural production, ensures the availability of food and water. The method th...

Design Of Effectively Efficient Techniques For Circumvent Wireless Network Security Threats And Attacks

   ABSTRACT The rapid increase in computer, mobile applications and wireless networks has globally changed the features of network security. A series of Internet attack and fraudulent acts on companies and individual network have shown us that open computer networks have no immunity from intrusions. The traditional way of protecting computer networks, such as firewalls and software encryption are insufficient and ineffective. The wireless ad-hoc network is susceptible to physical attack ...

Case Study: Unyama National Teachers College, Gulu

For the last few years, technology has spread so fast. Every institution wants to computerize its system. Unyama National Teachers' College is one of the institutions. This institution is a teachers' training school whereby every year, students graduate after completing their course (takes two years). This therefore calls for an efficient and timely way of processing the students' transcript. A full analysis of the current system was done and problems being faced noted down. With knowledge ga...

Design Of An Electronic Siren Circuit

Siren is a device that produces loud noise. They are the means communication. Sirens can be seen in emergency vehicles such as police cars, ambulances and fire trucks. Generally, sirens are used as indication or warning. There are different circuits to produce different sirens. The word siren first originated in Greek mythology and was also later used to refer to mermaids. Language and literature have used the word siren as indicative of dangerous temptations. The siren as we understand ...

Strategies For Optimizing Password Management Against Versatile Attacks

ABSTRACT Managing passwords is a significant problem for most people in the modern world. Passwords are a critical part of information and network security. Passwords serve as primary authentication method to protect user accounts but a poorly chosen password, if compromised, could put the entire network at risk. Many users do not understand why good passwords and password management are important for information systems. “We’re secure! We use passwords!” How many of us have heard...


646 - 660 Of 3407 Results