Manuscripts

Recent Papers

Research Paper

Six Strokes Engine

Six Stroke engine, the name itself indicates a cycle of six strokes out of which two are useful power strokes. According to its mechanical design, the six-stroke engine with external and internal combustion and double flow is similar to the actual internal reciprocating combustion engine. However, it differentiates itself entirely, due to its thermodynamic cycle and a modified cylinder head with two supplementary chambers: combustion and an air heating chamber, both independent from the cylinder. In this, the cylinder and the combustion chamber are separated which gives more freedom for design analysis. In addition to the two valves in the four-stroke engine, two more valves are incorporated which are operated by a piston arrangement. The Six Stroke is thermodynamically more efficient because the change in volume of the power stroke is greater than the intake stroke and the compression stroke. The main advantages of six stroke engine include a reduction in fuel consumption by 40%, two power strokes in the six-stroke cycle, a dramatic reduction in pollution, adaptability to multi-fuel operation. Six-stroke engine’s adoption by the automobile industry would have a tremendous impact on the environment and world economy. There are additional two strokes, namely another power, and exhaust strokes. The engine works by harnessing wasted heat energy created by the fuel combustion. After the combustion stage water is injected into the superheated cylinder. The water explodes into steam and forces the piston down. It, in turn, helps to cool the engine. That resulted in normal levels of power but using much less fuel. It also has the advantage of not requiring an external cooling system. In order to achieve these benefits, major modifications of conventional internal combustion engine must be done. In this paper, the modification of the conventional four-stroke internal combustion engine is illustrated to convert it into six stroke engine.

Published by: Viral M. Vadadoria

Author: Viral M. Vadadoria

Paper ID: V4I1-1321

Paper Status: published

Published: February 7, 2018

Full Details
Review Paper

Performance Evaluation and Treatment Optimization of ETP and STP- Review

Textile industrial Effluent Treatment Plants (ETP) and Sewage Treatment Plants (STP)   are constructed to protect the environment from excessive overloading from different kinds of pollutants. The effluent must meet the appropriate discharge standards as per pollution control board before discharging it to the environment. Improper treatment process conditions at treatment plants result in the release of effluent that may contain toxins and unacceptable high levels of dangerous organic and inorganic materials into various water bodies and the land environment so it is necessary to adopt proper treatment technology for the treatment. The present paper is reviewed for performance evaluation of ETP, STP and Coagulation and Flocculation process. Coagulation and Flocculation is not an Eco-friendly approach so Electrocoagulation (EC) is also reviewed to know the removal efficiencies of pollutant loads.  

Published by: Yashodha M. C, Dr. B. Manoj Kumar, Parinitha T. Niranjan

Author: Yashodha M. C

Paper ID: V4I1-1325

Paper Status: published

Published: February 7, 2018

Full Details
Review Paper

A Study of Major Issues Related to Brain Drain from India to USA

The Government of India estimated that there are 30 million Indian human resources who are working in the developed countries are highly educated and skilled. This paper mainly focuses on the causes of brain drain in Indian scenario and given the suggestions to control the movement of skilled labor from India to the USA. Youth must contribute to its own economy and contribute to become a developed country from developing.  

Published by: Charu Goel

Author: Charu Goel

Paper ID: V4I1-1323

Paper Status: published

Published: February 7, 2018

Full Details
Research Article

Comparative Analysis of Indian and American Federalism

This article embarks upon the concept of Federalism and also strives for comparative analysis of Indian & American Federalism, the article examines the federal structure of both the country in light of the traditional conception of federalism and it further examines the structure on touchstone of Ivo D. Duchacek’s ten yardsticks of federalism, Both countries have been examined in light of their constitutional scheme and judicial pronouncements.  

Published by: Raghav Dhoot

Author: Raghav Dhoot

Paper ID: V4I1-1310

Paper Status: published

Published: February 7, 2018

Full Details
Research Paper

Twitter Sentiment Analysis using Vader

Twitter is a micro-blogging site used by people to express their opinions on various topics. Sentiment Analysis is the process of extracting meaningful customer insight from a text in terms of sentiment score. Twitter Sentiment analysis is an application of sentiment analysis, on the twitter data (tweets).But today it has become difficult to analyze tweets because of the changed and challenging formats of the tweets. The increase in the use of various slangs, emoticons, abbreviations, and puns in tweets, has made it difficult to analyze tweets in the same ways as before. In this paper, we aim to review some papers regarding research in sentiment analysis on Twitter, describing the methodologies adopted and models applied; along with describing Vader Sentiment Analysis which is a Python-based approach.

Published by: Vipul Kumar Chauhan, Ashish Bansal, Dr. Amita Goel

Author: Vipul Kumar Chauhan

Paper ID: V4I1-1307

Paper Status: published

Published: February 7, 2018

Full Details
Thesis

Data Encryption without Using Prime Numbers

It is an encryption algorithm that uses randomly generated number sequences to encrypt data, instead of using prime numbers hence saving so much processing time, generating prime in itself a tedious task and required a heavy amount of computation, but generating random number sequences is far easier and require a significantly lesser amount of computation. This algorithm generates two random number sequences (discussed in introduction) (treated as private keys), digits in these number sequences are grouped in different configuration viz. 2 DG (grouping 2 digits),3 DG(grouping 3 digits) this form groups of digits in both number sequences, these groups are then multiplied to form a result and this result is multiplied with plain data to encrypt the data.  

Published by: Abhishek Kumar

Author: Abhishek Kumar

Paper ID: V4I1-1303

Paper Status: published

Published: February 5, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X