Engineering

Research Papers/Topics Engineering

COVID-19 Virus Repellent Solution Based on the Liquid Electric Air Sanitization

Indubitably the most challenging coronavirus (Covid-19) outbreak, caused by SARS-CoV-2. With the number of Covid-19 cases now approaching millions globally so, for controlling the current infection rate, we have come up with this innovation of virus repellent electric liquid vaporizer means by vaporization of the solution which is the in-liquid form by means of electricity, which will enable the infectious virus and bacteria to be less effective also it will sometime kill the virus in a small...

Statistical Analysis of Vibration Signals for Condition Monitoring of Defects in Exhaust Fan Bearing

ABSTRACT Identification of exhaust fan bearing defects has its root foundations in the analysis of frequency modulation and sensing using mostly online techniques. Centrifugal fans are the most commonly used fans in the industry today. They are preferred to axles because they are cheaper and constructed with simplicity. They are used in wind systems in vehicles and buildings and also in delivering gas or minerals. They are suitable for industrial and air pollution processes and systems. Fa...

Fluidized Bedreactor Modelling and Simulation with Aspen Plus for Alumina (AL2O3) Production Systems

Abstract:Fluidized bed reactor is useful for heterogeneous (multiphase) reactions, separations, size enlargement, coating, and blending in chemical and pharmaceuticals industries. To develop a model and simulation of this reactor with advanced systems process engineering software (Aspen Plus). Aspen plus has the capability to simulate real factory performance, design improved plants, and intensify profitability in present plants. This modeling and simulation are applied Geldart B particle cla...

Fire Risk Assessment Of Construction Companies in Nueva Ecija

Abstract Fire safety is an important consideration in many structures and spaces because of the danger and damage that it may pose. Given so, a fire risk assessment is not often conducted on construction sites or while the building is under construction. They only assess this after the construction or before they provide an occupancy permit. Thus, this study assessed the level of fire risk of construction sites in Nueva Ecija. The study included 61 respondents all over the province. The study...

Cashew Nut Shell Liquid, A Renewable and Reliable Petro-Chemical Feedstock

ABSTRACT The physical properties of CNSL extracted by pyrolysis was studied using standard procedures. The physical properties of the CNSL studied and results obtained compared with other extraction methods (hexane extracted and decarboxylated) from literature are moisture content 4.1%, (6.40%, 3.2%), specific gravity 0.943 (0.926, 0.926) viscosity 57cp (40cp, 358cp), pH 4.5 (4.5, 5.2) and the percent composition of the CNSL compared with those from literature are cardol 27% (30%, 31% (carda...

Strategies For Optimizing Password Management Against Versatile Attacks

Managing passwords is a significant problem for most people in the modern world. Passwords are a critical part of information and network security. Passwords serve as primary authentication method to protect user accounts but a poorly chosen password, if compromised, could put the entire network at risk. Many users do not understand why good passwords and password management are important for information systems. “We’re secure! We use passwords!” How many of us have heard this claim? Or...

The Role Of Drought On Agricultural Production; A Case Study Of Fafi District In North Eastern, Kenya

ABSTRACT A case study of the role of drought on agricultural production was conducted among small-scale farmers in the Bun division of Fafi district in Northeastern Kenya, to determine how drought affects the agricultural production, causes and different types of drought that exists and what can be done to minimize the impacts of drought in the study area. Achieving these objectives would help increase the agricultural production, ensures the availability of food and water. The method th...

Design Of Effectively Efficient Techniques For Circumvent Wireless Network Security Threats And Attacks

   ABSTRACT The rapid increase in computer, mobile applications and wireless networks has globally changed the features of network security. A series of Internet attack and fraudulent acts on companies and individual network have shown us that open computer networks have no immunity from intrusions. The traditional way of protecting computer networks, such as firewalls and software encryption are insufficient and ineffective. The wireless ad-hoc network is susceptible to physical attack ...

Case Study: Unyama National Teachers College, Gulu

For the last few years, technology has spread so fast. Every institution wants to computerize its system. Unyama National Teachers' College is one of the institutions. This institution is a teachers' training school whereby every year, students graduate after completing their course (takes two years). This therefore calls for an efficient and timely way of processing the students' transcript. A full analysis of the current system was done and problems being faced noted down. With knowledge ga...

Design Of An Electronic Siren Circuit

Siren is a device that produces loud noise. They are the means communication. Sirens can be seen in emergency vehicles such as police cars, ambulances and fire trucks. Generally, sirens are used as indication or warning. There are different circuits to produce different sirens. The word siren first originated in Greek mythology and was also later used to refer to mermaids. Language and literature have used the word siren as indicative of dangerous temptations. The siren as we understand ...

Strategies For Optimizing Password Management Against Versatile Attacks

ABSTRACT Managing passwords is a significant problem for most people in the modern world. Passwords are a critical part of information and network security. Passwords serve as primary authentication method to protect user accounts but a poorly chosen password, if compromised, could put the entire network at risk. Many users do not understand why good passwords and password management are important for information systems. “We’re secure! We use passwords!” How many of us have heard...

Design And Construction Of A Door Lock Alert System Using A Microcontroller

ABSTRACT This project focused on how one can safely keep the house safely locked through minimizing the access to its door unit, monitoring whoever is trying to open the door and providing an alert to the security agencies in case he/she is proved an intruder by the system. The work is arranged mainly in five chapters, Chapter one includes the introduction of a system. Chapter two discusses the literature related to the system, Chapter three illustrates the methodologies used in coming up wit...

Design And Fabrication Of An Electronic System For Pressure And Temperature Measurement In Thin Film Deposition Systems

Temperature and pressure are quantities of great importance in various applications such as integrated circuit (IC) manufacture and vacuum coating just to mention a few. Therefore, their accurate measurement is inevitable. However, it is tiresome to measure and record these quantities manually by pen and paper when operating a thin film deposition system. This approach is not only time consuming but also causes human errors on the measured physical parameters. To solve this problem, an automa...

Compressionion Of Pulse Code Modulation Signal Using Type Iv Discrete Cosine Transform Based On The Mp3 Model.

Digital signal compression in the recent past has become the mainstay of the basic technologies of multimedia due to the bandwidth and storage limitations inherent in networks and computers. The change from circuit switched to packet switched systems in the telecommunication infrastructure in the past few years, has reflected on the way Pulse Code Modulation (PCM) signal which in essence is a raw audio signal, is carried in present systems. The purpose of this study was to design an applicati...

LPG Gas Monitoring and Cylinder Booking Alert System

LPG is widely used in our everyday life. It should be handled with care as it is highly flammable which causes а fire or explosion. The above circumstances can be overcome by implementing techniques for detecting accurate gas leaks. The main aim of this paper is to put forth an IOT gas management system that will be able to sense gas leakage and fire detection. Whenever leakage of gas is detected, the user will be alerted through SMS and call so that the user can turn off the gas valve immed...


616 - 630 Of 3373 Results
@