Abstract:Fluidized bed reactor is useful for heterogeneous (multiphase) reactions, separations, size enlargement, coating, and blending in chemical and pharmaceuticals industries. To develop a model and simulation of this reactor with advanced systems process engineering software (Aspen Plus). Aspen plus has the capability to simulate real factory performance, design improved plants, and intensify profitability in present plants. This modeling and simulation are applied Geldart B particle cla...
Abstract Fire safety is an important consideration in many structures and spaces because of the danger and damage that it may pose. Given so, a fire risk assessment is not often conducted on construction sites or while the building is under construction. They only assess this after the construction or before they provide an occupancy permit. Thus, this study assessed the level of fire risk of construction sites in Nueva Ecija. The study included 61 respondents all over the province. The study...
ABSTRACT The physical properties of CNSL extracted by pyrolysis was studied using standard procedures. The physical properties of the CNSL studied and results obtained compared with other extraction methods (hexane extracted and decarboxylated) from literature are moisture content 4.1%, (6.40%, 3.2%), specific gravity 0.943 (0.926, 0.926) viscosity 57cp (40cp, 358cp), pH 4.5 (4.5, 5.2) and the percent composition of the CNSL compared with those from literature are cardol 27% (30%, 31% (carda...
Managing passwords is a significant problem for most people in the modern world. Passwords are a critical part of information and network security. Passwords serve as primary authentication method to protect user accounts but a poorly chosen password, if compromised, could put the entire network at risk. Many users do not understand why good passwords and password management are important for information systems. “We’re secure! We use passwords!” How many of us have heard this claim? Or...
ABSTRACT A case study of the role of drought on agricultural production was conducted among small-scale farmers in the Bun division of Fafi district in Northeastern Kenya, to determine how drought affects the agricultural production, causes and different types of drought that exists and what can be done to minimize the impacts of drought in the study area. Achieving these objectives would help increase the agricultural production, ensures the availability of food and water. The method th...
ABSTRACT The rapid increase in computer, mobile applications and wireless networks has globally changed the features of network security. A series of Internet attack and fraudulent acts on companies and individual network have shown us that open computer networks have no immunity from intrusions. The traditional way of protecting computer networks, such as firewalls and software encryption are insufficient and ineffective. The wireless ad-hoc network is susceptible to physical attack ...
For the last few years, technology has spread so fast. Every institution wants to computerize its system. Unyama National Teachers' College is one of the institutions. This institution is a teachers' training school whereby every year, students graduate after completing their course (takes two years). This therefore calls for an efficient and timely way of processing the students' transcript. A full analysis of the current system was done and problems being faced noted down. With knowledge ga...
Siren is a device that produces loud noise. They are the means communication. Sirens can be seen in emergency vehicles such as police cars, ambulances and fire trucks. Generally, sirens are used as indication or warning. There are different circuits to produce different sirens. The word siren first originated in Greek mythology and was also later used to refer to mermaids. Language and literature have used the word siren as indicative of dangerous temptations. The siren as we understand ...
ABSTRACT Managing passwords is a significant problem for most people in the modern world. Passwords are a critical part of information and network security. Passwords serve as primary authentication method to protect user accounts but a poorly chosen password, if compromised, could put the entire network at risk. Many users do not understand why good passwords and password management are important for information systems. “We’re secure! We use passwords!” How many of us have heard...
ABSTRACT This project focused on how one can safely keep the house safely locked through minimizing the access to its door unit, monitoring whoever is trying to open the door and providing an alert to the security agencies in case he/she is proved an intruder by the system. The work is arranged mainly in five chapters, Chapter one includes the introduction of a system. Chapter two discusses the literature related to the system, Chapter three illustrates the methodologies used in coming up wit...
Temperature and pressure are quantities of great importance in various applications such as integrated circuit (IC) manufacture and vacuum coating just to mention a few. Therefore, their accurate measurement is inevitable. However, it is tiresome to measure and record these quantities manually by pen and paper when operating a thin film deposition system. This approach is not only time consuming but also causes human errors on the measured physical parameters. To solve this problem, an automa...
Digital signal compression in the recent past has become the mainstay of the basic technologies of multimedia due to the bandwidth and storage limitations inherent in networks and computers. The change from circuit switched to packet switched systems in the telecommunication infrastructure in the past few years, has reflected on the way Pulse Code Modulation (PCM) signal which in essence is a raw audio signal, is carried in present systems. The purpose of this study was to design an applicati...
LPG is widely used in our everyday life. It should be handled with care as it is highly flammable which causes а fire or explosion. The above circumstances can be overcome by implementing techniques for detecting accurate gas leaks. The main aim of this paper is to put forth an IOT gas management system that will be able to sense gas leakage and fire detection. Whenever leakage of gas is detected, the user will be alerted through SMS and call so that the user can turn off the gas valve immed...
Despite high levels of good quality tomato production in Kenya, about 40% of the produce goes to waste. This loss is attributed to glut during the harvesting season, poor feeder roads which lead to inaccessibility to the market centres as well as bruise damage during transport. This translates to a huge financial loss to tomato farmers. Preservation through drying technology can help in reducing this loss. Therefore, this study was initiated to investigate the performance of an experi...
In the recent past the use of renewable energy as an alternative source of energy has increased considerably. The solar cells modules manufacturing technology is becoming more reliable and economical. The feasibility of photovoltaic solar energy as an alternative source of energy has become real. The low efficiency and the weather condition dependency give room for improvement of this technology to extract maximum power for different environmental conditions. Therefore, the current–volt...