J: General Engineering

J: General Engineering (126)

GJRE: J

Well Screens and Gravel Packs
Published In: GJRE Part: J: General Engineering Volume: 15 Issue: 5
The purpose of well screens and gravel packs is to maintain open access within the aquifer ensuring that thorough development of the well is not impeded by sand. Where a well draws on unconsolidated sands and gravels, or other friable materials. The production section is characterized by mainly medium to coarse grained sandstone, the uniformity coefficient efficient ranging from 1.44 to ...
Paper Information
Authors Mehaysen A. Mahasneh
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 11

The ultra wide band (UWB) circular microstrip antennas are devoloped and simulated for wide band communication applications.In these a circular radiating aperture is made available for broad band characteristics.The proposed antennas consists of the vertical and horizontal elements of L-type probe fixed at front and back portion of the substrate respectively.These antennas are excited by...
Paper Information
Authors Agni Venkata Krishna
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 26

The spectral centroid is one of the useful low level features of a signal that was proposed for speech-music classification, speech recognition and musical instrument classification, and was also considered one of the lowlevel features to describe the audio content in MPEG-7 Content Description and Interface Standard. When the spectral centroid is computed from practical data, the estima...
Paper Information
Authors Venkata Krishna Rao M
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 41

Firewood-Stove Made in Rwandan Rock
Published In: GJRE Part: J: General Engineering Volume: 15 Issue: 4
Firewood-Stove Made in Rwandan Rock ...
Paper Information
Authors Munyaneza Jean de Dieu
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 29

The effect of the Fuel Performance Catalyst (FPC) on the different diesel properties namely density, viscosity and flashpoint of biofuel has been investigated. The biodiesel-petro-diesel blends concentrations (Vol %) of B10, B20 and B30 have been analyzed with the pure biodiesel (B100) and petro-diesels (B0) as upper and lower boundaries respectively. The results indicated that the FPC: ...
Paper Information
Authors Mosesane M.J, Mbaya R. K. K., Tshabalala L.C., Kalombo L.
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 7

The fuel spray in gasoline engines problem has been an issue of importance for creating a suitable mixture during the engine load and speed variation to avoid knocking. This paper describes theoretical and experimental investigations for an important stage of injected gasoline called the primary fuel spray. This stage two dimensional (2D) is challenging because of the difficulty in deter...
Paper Information
Authors Sadoun F. Dakhil, Qais A. Rishack, Bilal F. Sayhood
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 16

Experimental Investigation & Modelling Studies for Different Tubes of Heat Exchanger using CFD. ...
Paper Information
Authors Roshan. V. Marode, Ashok. J.Keche
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 24

This research aims to permit a simultaneous visualization of primary and secondary functions, sub-functions and subsystems in order to establish, according to its position in the plane, the influence on the overall function and how it can be inserted into the product design. The methodology described consists of an in depth-study of the functional deployment starting from a basic need. S...
Paper Information
Authors Adriana Yumi Sato Duarte, Marilia Colozio Favaro, Fabio Mazzariol Santiciolli, Franco Giuseppe Dedini
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 11

Due to resource constrains, implementation of secure protocols for securing embedded systems has become a challenging task.System designers are advised to design and install area efficient versions of existing, proven security protocols. System designers are finding ways and means to compress existing security protocols without compromising security and without tampering with basic secur...
Paper Information
Authors Sunil Devidas Bobade, Dr.Vijay R. Mankar
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 18

At present days, technology growth was rapid and its use is very often. So the attacks were concentrated on the user systems mainly by using the network applications. Bugs in the application of a network can ruin the applications in a system that are running. When the user is in the use of internet or e-commerce sites, etc.., the applications will be considered that they are in an unsafe...
Paper Information
Authors Terva Jahnavi, K.Jaya Krishna, K.Kondaiah
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 21