In this study, a Numerical model is carried out to study the effect of welding parameters on the temperature variations in Submerged Arc Welding process (SAW) with moving heat source model (Gaussian distribution) by using finite difference method…
The Circulation Water Channel (CWC) is an experimental facility available at Indian Maritime University, Visakhapatnam Campus. A study for comparing the flow pattern and velocity in the test section, for different configurations of the CWC, is…
Presence is one of the inherent aspects of the students. The presence system conducted in kindergarten Nurul Huda Kotapinang still uses a conventional system in the form of absent notes or books. This is considered less efficient because the data…
In learning, each student must have a different way of learning and learning patterns which will have an impact on the results of their learning evaluation at the end of each semester. Assessing a student who excels in learning is one of them by…
This article sets out to theoretically explain the Caribbean Community's (CARICOM) integrative stalemate. It argues that this needs to be studied in light of a changing regional, geographic, and geostrategic climate. A shift is occurring from…
NFC is a standards-based, short-range wireless
connectivity technology that enables simple and safe two-way
interactions between electronic devices. The concept is based
on combination of smartcard and contactless interconnection
technologies; NFC is…
The present investigation aims at analyzing the regional disparities in the levels of Human development and finding out the relationship between the Human development and the level of women empowerment in the Karnataka state. Five variables namely;…
This study discusses the Performance of Moisture soil sensor, which is useful as a sensor to detect soil moisture level used as plant nutrition. The monitoring process is carried out in real-time using internet of things technology based on LoRa or…
Learning to program is difficult for many first year undergraduate students. Instructional strategies of traditional programming courses tend to focus on syntactic issues and assigning practice exercises using the presentation-examples-practice…
Security attacks become daily news due to an exposure of a security threat in a widely used software. Taking software security into consideration during the analysis, design, and implementation phases is a must. A software application should be…