Engineering

Research Papers/Topics in Engineering

Cashew Nut Shell Liquid, A Renewable and Reliable Petro-Chemical Feedstock

ABSTRACT The physical properties of CNSL extracted by pyrolysis was studied using standard procedures. The physical properties of the CNSL studied and results obtained compared with other extraction methods (hexane extracted and decarboxylated) from literature are moisture content 4.1%, (6.40%, 3.2%), specific gravity 0.943 (0.926, 0.926) viscosity 57cp (40cp, 358cp), pH 4.5 (4.5, 5.2) and the percent composition of the CNSL compared with those from literature are cardol 27% (30%, 31% ...

Strategies For Optimizing Password Management Against Versatile Attacks

Managing passwords is a significant problem for most people in the modern world. Passwords are a critical part of information and network security. Passwords serve as primary authentication method to protect user accounts but a poorly chosen password, if compromised, could put the entire network at risk. Many users do not understand why good passwords and password management are important for information systems. “We’re secure! We use passwords!” How many of us have heard this clai...

The Role Of Drought On Agricultural Production; A Case Study Of Fafi District In North Eastern, Kenya

ABSTRACTA case study of the role of drought on agricultural production was conducted among small-scale farmers in the Bun division of Fafi district in Northeastern Kenya, to determine how drought affects the agricultural production, causes and different types of drought that exists and what can be done to minimize the impacts of drought in the study area. Achieving these objectives would help increase the agricultural production, ensures the availability of food and w...

Design Of Effectively Efficient Techniques For Circumvent Wireless Network Security Threats And Attacks

  ABSTRACT The rapid increase in computer, mobile applications and wireless networks has globally changed the features of network security. A series of Internet attack and fraudulent acts on companies and individual network have shown us that open computer networks have no immunity from intrusions. The traditional way of protecting computer networks, such as firewalls and software encryption are insufficient and ineffective. The wireless ad-hoc network is susceptible to ...

Case Study: Unyama National Teachers College, Gulu

For the last few years, technology has spread so fast. Every institution wants to computerize its system. Unyama National Teachers' College is one of the institutions.This institution is a teachers' training school whereby every year, students graduate after completing their course (takes two years).This therefore calls for an efficient and timely way of processing the students' transcript. A full analysis of the current system was done and problems being faced noted down.With knowledge...

Design Of An Electronic Siren Circuit

Siren is a device that produces loud noise. They are the means communication. Sirens can be seen in emergency vehicles such as police cars, ambulances and fire trucks.Generally, sirens are used as indication or warning. There are different circuits to produce different sirens. The word siren first originated in Greek mythology and was also later used to refer to mermaids. Language and literature have used the word siren as indicative of dangerous temptations. The sire...

Strategies For Optimizing Password Management Against Versatile Attacks

ABSTRACTManaging passwords is a significant problem for most people in the modern world. Passwords are a critical part of information and network security. Passwords serve as primary authentication method to protect user accounts but a poorly chosen password, if compromised, could put the entire network at risk. Many users do not understand why good passwords and password management are important for information systems. “We’re secure! We use passwords!” H...

Design And Construction Of A Door Lock Alert System Using A Microcontroller

ABSTRACTThis project focused on how one can safely keep the house safely locked throughminimizing the access to its door unit, monitoring whoever is trying to open thedoor and providing an alert to the security agencies in case he/she is proved anintruder by the system. The work is arranged mainly in five chapters, Chapter oneincludes the introduction of a system. Chapter two discusses the literature relatedto the system, Chapter three illustrates the methodologies used in coming up wit...

Design And Fabrication Of An Electronic System For Pressure And Temperature Measurement In Thin Film Deposition Systems

Temperature and pressure are quantities of great importance in various applications such as integrated circuit (IC) manufacture and vacuum coating just to mention a few. Therefore, their accurate measurement is inevitable. However, it is tiresome to measure and record these quantities manually by pen and paper when operating a thin film deposition system. This approach is not only time consuming but also causes human errors on the measured physical parameters. To solve this problem, an ...

Compressionion Of Pulse Code Modulation Signal Using Type Iv Discrete Cosine Transform Based On The Mp3 Model.

Digital signal compression in the recent past has become the mainstay of the basic technologies of multimedia due to the bandwidth and storage limitations inherent in networks and computers. The change from circuit switched to packet switched systems in the telecommunication infrastructure in the past few years, has reflected on the way Pulse Code Modulation (PCM) signal which in essence is a raw audio signal, is carried in present systems. The purpose of this study was to design an app...

LPG Gas Monitoring and Cylinder Booking Alert System

LPG is widely used in our everyday life. It should be handled with care as it is highly flammable which causes а fire or explosion. The above circumstances can be overcome by implementing techniques for detecting accurate gas leaks. The main aim of this paper is to put forth an IOT gas management system that will be able to sense gas leakage and fire detection. Whenever leakage of gas is detected, the user will be alerted through SMS and call so that the user can turn off the gas valve im...

Design, Development And Testing Of A Liquefied Petroleum Gas Powered Tomato Dryer With Water Energy Stotage

Despite high levels of good quality tomato production in Kenya, about 40% of the produce goes to waste.  This loss is attributed to glut during the harvesting season, poor feeder roads which lead to inaccessibility to the market centres as well as bruise damage during transport.  This translates to a huge financial loss to tomato farmers.  Preservation through drying technology can help in reducing this loss.  Therefore, this study was initiated to investigate the pe...

Designing And Fabrication Of A Current-Voltage Curve Meter For Electrical Characterization Of Photovoltaic Modules

In the recent past the use of renewable energy as an alternative source of energy has increased considerably. The solar cells modules manufacturing technology is becoming more reliable and economical. The feasibility of photovoltaic solar energy as an alternative source of energy has   become real. The low efficiency and the weather condition dependency give room for improvement of this technology to extract maximum power for different environmental conditions. Therefore, the ...

Study Of Snxsey Thin Films For Phase Change Memory (Pcm) Applications

Phase Change Random Access Memory (PCM) is one of the most optimized candidates for the next generation non-volatile memory due to its fast operation speed, high scalability, low power operation and fabrication costs. The transition from the amorphous to the crystalline phase is induced by heating the material above its crystallization temperature for a long enough time, and the switching back to the amorphous phase is realized by melting and quenching the material fast enough that it s...

Influence Of Integration Of Information And Communication Technology In Teaching Biology On Students’ Performance In Makueni County Secondary Schools, Kenya

ABSTRACT There are great technological advancements in global application of ICT and hence the need for its use in teaching Biology. Lack of application of ICT in pedagogy might have led to poor performance in science subjects like Biology. The study sought to investigate the influence of integration of ICT in teaching Biology on students’ performance in secondary schools. The specific objectives of the study were: to find out the ICT resources available in the schools for use in teac...


1 - 15 Of 2779 Results