Pub Date : 2022-03-01DOI: 10.24203/ajet.v10i1.6925
Maad M. Mijwil
The optoelectronic achievement of a lattice matching InGaAs/InP lateral cavity surface radiating LASER in crystal orientations (100), (110), (111), (113), and (131) is computationally simulated utilising MATLAB by attempting to solve a k.p Hamiltonian of eight-band utilising only a finite difference strategy with spin-orbit linkage. To shift wave-vector k as well as Hamiltonian from traditional (100) plane orientation, tensor plane revolution equations are used. It is demonstrated that optical emission spectrum and crystal plane alignments have a significant correlation. At a carriers injection density of 2.50 x 1018 per cm3, the maximum and minimum gains are measured in the (111) as well as (100) orientations, respectively, with optimum emission wavelengths of 1770.00nm and 1680.00nm. This research will serve as a catalyst for the development of ultra-fast optoelectronic devices with improved performance thanks to the use of non-100 orientation epitaxial layers.
利用MATLAB对晶体(100)、(110)、(111)、(113)、(131)取向的InGaAs/InP侧腔面在(100)、(110)、(111)、(113)和(131)上的晶格匹配的光电实现进行了计算模拟,试图仅利用自旋轨道联动的有限差分策略求解八波段的k.p哈密顿量。为了将波矢量k和哈密顿量从传统的(100)平面方向上移开,使用了张量平面旋转方程。结果表明,光学发射光谱与晶体平面排列具有显著的相关性。在载流子注入密度为2.50 x 1018 / cm3时,在(111)和(100)方向分别测量到最大和最小增益,最佳发射波长为1770.00nm和1680.00nm。由于使用了非100取向外延层,这项研究将成为开发超高速光电器件的催化剂,并提高其性能。
{"title":"Optical and Electrical Performance Analysis of InGaAs/InP Laser for Various Crystal Orientations","authors":"Maad M. Mijwil","doi":"10.24203/ajet.v10i1.6925","DOIUrl":"https://doi.org/10.24203/ajet.v10i1.6925","url":null,"abstract":"The optoelectronic achievement of a lattice matching InGaAs/InP lateral cavity surface radiating LASER in crystal orientations (100), (110), (111), (113), and (131) is computationally simulated utilising MATLAB by attempting to solve a k.p Hamiltonian of eight-band utilising only a finite difference strategy with spin-orbit linkage. To shift wave-vector k as well as Hamiltonian from traditional (100) plane orientation, tensor plane revolution equations are used. It is demonstrated that optical emission spectrum and crystal plane alignments have a significant correlation. At a carriers injection density of 2.50 x 1018 per cm3, the maximum and minimum gains are measured in the (111) as well as (100) orientations, respectively, with optimum emission wavelengths of 1770.00nm and 1680.00nm. This research will serve as a catalyst for the development of ultra-fast optoelectronic devices with improved performance thanks to the use of non-100 orientation epitaxial layers.","PeriodicalId":8524,"journal":{"name":"Asian Journal of Engineering and Applied Technology","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81034007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Christodoulou, P. Lokkas, A. Droudakis, X. Spiliotis, D. Kasiteropoulou, N. Alamanis
Grouting includes a range of processes that involve the injection of wet or dry materials into the ground to provide improved engineering properties. Common aims are to increase strength or stiffness or to reduce permeability within the mass of ground treated. This paper, mainly, addresses permeation grouting for the improvement of soils, in terms of strengthening or reduction of permeability, and compensation grouting for the displacement of structures during subsurface exploration. The grouts used to make permeation grouting are suspensions and chemical solutions. The suspensions penetrate well into soils with granulometry up to coarse sand. On the contrary, the chemical solutions penetrate satisfactorily in finer formations up to fine sands or coarse sludges. Because some chemical solutions are toxic or generally harmful to the environment and humans, an effort has been made internationally in recent years to replace them with inorganic fine-grained suspensions.
{"title":"The Development of Practice in Permeation Grouting by using Fine-grained Cement Suspensions","authors":"D. Christodoulou, P. Lokkas, A. Droudakis, X. Spiliotis, D. Kasiteropoulou, N. Alamanis","doi":"10.24203/ajet.v9i6.6846","DOIUrl":"https://doi.org/10.24203/ajet.v9i6.6846","url":null,"abstract":"Grouting includes a range of processes that involve the injection of wet or dry materials into the ground to provide improved engineering properties. Common aims are to increase strength or stiffness or to reduce permeability within the mass of ground treated. This paper, mainly, addresses permeation grouting for the improvement of soils, in terms of strengthening or reduction of permeability, and compensation grouting for the displacement of structures during subsurface exploration. The grouts used to make permeation grouting are suspensions and chemical solutions. The suspensions penetrate well into soils with granulometry up to coarse sand. On the contrary, the chemical solutions penetrate satisfactorily in finer formations up to fine sands or coarse sludges. Because some chemical solutions are toxic or generally harmful to the environment and humans, an effort has been made internationally in recent years to replace them with inorganic fine-grained suspensions.","PeriodicalId":8524,"journal":{"name":"Asian Journal of Engineering and Applied Technology","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84659779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-05DOI: 10.51983/ajeat-2021.10.2.2947
S. J. Wagh, Shaktisingh G. Raulji, Sathish Gaddam
The aim of this experimental work was to know the effect of addition of certain inorganic salts on removal of aniline from water by using toluene as the extracting solvent. The inorganic salts used were NaCl, KI, and MgCl2·6H2O. The influence of factors such as amount of salt, phase volume ratio, initial aniline concentration in feed-water solution, and temperature on the distribution of aniline was investigated. It was found that addition of 5% NaCl shows an appreciable salting-out effect on distribution of aniline. It was also found that the distribution of aniline was favoured at low aniline concentrations, and a phase volume ratio of toluene to water of little above 1.0. It is also found that the dissociation of salt added plays an important role in aniline extraction and the effect of cation and/or anion as predicted by the Hofmeister series may not be always followed in all cases. The distribution of aniline between water and toluene is found to be endothermic in nature.
{"title":"Experimental Study on Effect of Addition of Different Salts on Distribution of Aniline between Water and Toluene","authors":"S. J. Wagh, Shaktisingh G. Raulji, Sathish Gaddam","doi":"10.51983/ajeat-2021.10.2.2947","DOIUrl":"https://doi.org/10.51983/ajeat-2021.10.2.2947","url":null,"abstract":"The aim of this experimental work was to know the effect of addition of certain inorganic salts on removal of aniline from water by using toluene as the extracting solvent. The inorganic salts used were NaCl, KI, and MgCl2·6H2O. The influence of factors such as amount of salt, phase volume ratio, initial aniline concentration in feed-water solution, and temperature on the distribution of aniline was investigated. It was found that addition of 5% NaCl shows an appreciable salting-out effect on distribution of aniline. It was also found that the distribution of aniline was favoured at low aniline concentrations, and a phase volume ratio of toluene to water of little above 1.0. It is also found that the dissociation of salt added plays an important role in aniline extraction and the effect of cation and/or anion as predicted by the Hofmeister series may not be always followed in all cases. The distribution of aniline between water and toluene is found to be endothermic in nature.","PeriodicalId":8524,"journal":{"name":"Asian Journal of Engineering and Applied Technology","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87427245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-05DOI: 10.51983/ajeat-2021.10.2.3073
A. Heidari
CdO nanoparticles show a strong peak of Plasmon absorption in ultraviolet–visible zone. A strong interaction exists between the surface of CdO nanoparticles and aryl mercaptan compounds. Aryl mercaptan compounds cause to aggregation of CdO nanoparticles linked to DNA/RNA and hence, lead to widening of peak Plasmon of CdO nanoparticles surface at 550 (nm) and emerging a new peak at higher wavelength. In the current project, this optical characteristic of CdO nanoparticles is used to time investigate of interaction between different aryl mercaptanes and CdO nanoparticles. The results were shown that aryl mercaptan compounds with shorter chain length interact faster with CdO nanoparticles. Therefore, a simple and fast method for identification of aryl mercaptanes with various chain length using red shift in surficial Plasmon absorption is presented.
{"title":"A New Viewpoint and Outlook on Aryl Mercaptans as Strong Nucleophiles with Various Chain Length Linked to DNA/RNA and Cadmium Oxide (CdO) Nanoparticles Sandwiched Complex","authors":"A. Heidari","doi":"10.51983/ajeat-2021.10.2.3073","DOIUrl":"https://doi.org/10.51983/ajeat-2021.10.2.3073","url":null,"abstract":"CdO nanoparticles show a strong peak of Plasmon absorption in ultraviolet–visible zone. A strong interaction exists between the surface of CdO nanoparticles and aryl mercaptan compounds. Aryl mercaptan compounds cause to aggregation of CdO nanoparticles linked to DNA/RNA and hence, lead to widening of peak Plasmon of CdO nanoparticles surface at 550 (nm) and emerging a new peak at higher wavelength. In the current project, this optical characteristic of CdO nanoparticles is used to time investigate of interaction between different aryl mercaptanes and CdO nanoparticles. The results were shown that aryl mercaptan compounds with shorter chain length interact faster with CdO nanoparticles. Therefore, a simple and fast method for identification of aryl mercaptanes with various chain length using red shift in surficial Plasmon absorption is presented.","PeriodicalId":8524,"journal":{"name":"Asian Journal of Engineering and Applied Technology","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73777069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-05DOI: 10.51983/ajeat-2021.10.2.2953
M. Kamruzzaman, Sushil Nepal, Mushfiq Al Arafa
The numerical simulation of micro aerial vehicle (MAV) rotor blade aerodynamics is highly challenging in the field of rotor aerodynamics. The aim of this paper is to present a computational fluid dynamics (CFD) study on the aerodynamics analysis of micro aerial vehicle rotor blade at low-Reynolds number by means of Spalart-Allmaras turbulence model. The KA152313 airfoil, which is dedicated to mid to small-scale rotorcraft, e.g. MAV is chosen to design the rotor blade. The rotor blade was investigated in three different pitch configurations, which are GP13º, GP12º and GP11º and the aerodynamics characteristics are analyzed respectively. The CFD results of the analysis is used to compare the aerodynamic characteristics, e.g. pressure force, shear force and pitching moment on the chord surface of the rotor blades at different pitch configurations.
{"title":"Aerodynamic Analysis of Micro Aerial Vehicle Rotor Blade at Low Reynolds Number","authors":"M. Kamruzzaman, Sushil Nepal, Mushfiq Al Arafa","doi":"10.51983/ajeat-2021.10.2.2953","DOIUrl":"https://doi.org/10.51983/ajeat-2021.10.2.2953","url":null,"abstract":"The numerical simulation of micro aerial vehicle (MAV) rotor blade aerodynamics is highly challenging in the field of rotor aerodynamics. The aim of this paper is to present a computational fluid dynamics (CFD) study on the aerodynamics analysis of micro aerial vehicle rotor blade at low-Reynolds number by means of Spalart-Allmaras turbulence model. The KA152313 airfoil, which is dedicated to mid to small-scale rotorcraft, e.g. MAV is chosen to design the rotor blade. The rotor blade was investigated in three different pitch configurations, which are GP13º, GP12º and GP11º and the aerodynamics characteristics are analyzed respectively. The CFD results of the analysis is used to compare the aerodynamic characteristics, e.g. pressure force, shear force and pitching moment on the chord surface of the rotor blades at different pitch configurations.","PeriodicalId":8524,"journal":{"name":"Asian Journal of Engineering and Applied Technology","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77052133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-05DOI: 10.51983/ajeat-2021.10.2.3058
Alhassan Abdul-Barik, Issah Mubasir, A. Salamudeen
Encryption is the process of protecting information from unauthorized parties by converting such information into an unreadable form. Packet data is a method of transferring data, broken into bits called packets which travels over a network. Packet losses occur when packets fail to reach their destination devices as a result of network congestion, faulty routers or as a result of an attack. Encryption is the standard method for making a communication private. In sending a private message to another user, it is first encrypted (termed encipher), the intended recipient alone knows how to correctly decrypt (decipher) the message. There are several algorithms developed for the purpose of encryption which provides data security and integrity. This paper proposes the use of the Rivest-Shamir-Adleman (RSA) algorithm to implement a system for encrypting text files of any length (by breaking long messages into valid blocks and encrypting each block) capable of being transmitted using a Simple Mail Transfer Protocol (SMTP). Probable primes, 3048 bits in length are generated to be used in the generation of public, private key pairs for encryption and decryption. The proposed scheme is better because the route taken during transmission of data is recorded and packet losses are also checked for during transmission of encrypted files as compared to known state-of-the-art schemes.
{"title":"Fast Implementation of the Rivest-Shamir-Adleman (RSA) Algorithm with Robust Packet Data Loss Detection Function","authors":"Alhassan Abdul-Barik, Issah Mubasir, A. Salamudeen","doi":"10.51983/ajeat-2021.10.2.3058","DOIUrl":"https://doi.org/10.51983/ajeat-2021.10.2.3058","url":null,"abstract":"Encryption is the process of protecting information from unauthorized parties by converting such information into an unreadable form. Packet data is a method of transferring data, broken into bits called packets which travels over a network. Packet losses occur when packets fail to reach their destination devices as a result of network congestion, faulty routers or as a result of an attack. Encryption is the standard method for making a communication private. In sending a private message to another user, it is first encrypted (termed encipher), the intended recipient alone knows how to correctly decrypt (decipher) the message. There are several algorithms developed for the purpose of encryption which provides data security and integrity. This paper proposes the use of the Rivest-Shamir-Adleman (RSA) algorithm to implement a system for encrypting text files of any length (by breaking long messages into valid blocks and encrypting each block) capable of being transmitted using a Simple Mail Transfer Protocol (SMTP). Probable primes, 3048 bits in length are generated to be used in the generation of public, private key pairs for encryption and decryption. The proposed scheme is better because the route taken during transmission of data is recorded and packet losses are also checked for during transmission of encrypted files as compared to known state-of-the-art schemes.","PeriodicalId":8524,"journal":{"name":"Asian Journal of Engineering and Applied Technology","volume":"98 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86493596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-05DOI: 10.51983/ajeat-2021.10.2.3057
Alaa Alsaeed
In recent years, information security has become a corporate priority due tothe large number of cyber-attacks that happen every day. These attacks could cause a regression in economic growth, which makes corporations another reason to defend their system. This paper provides an introduction to Saudi Aramco as well as an overview of its products. Then, the paper examines the Aramco cyber-attack in 2012. Aramco is a massive company with huge facilities that require powerful policies on security. Aramco should implement a Redundant Array of Independent Disks and Intrusion Detection System and review the log files on the server to protect its servers against attacks.
{"title":"The Cyber Attack on Saudi Aramco in 2012","authors":"Alaa Alsaeed","doi":"10.51983/ajeat-2021.10.2.3057","DOIUrl":"https://doi.org/10.51983/ajeat-2021.10.2.3057","url":null,"abstract":"In recent years, information security has become a corporate priority due tothe large number of cyber-attacks that happen every day. These attacks could cause a regression in economic growth, which makes corporations another reason to defend their system. This paper provides an introduction to Saudi Aramco as well as an overview of its products. Then, the paper examines the Aramco cyber-attack in 2012. Aramco is a massive company with huge facilities that require powerful policies on security. Aramco should implement a Redundant Array of Independent Disks and Intrusion Detection System and review the log files on the server to protect its servers against attacks.","PeriodicalId":8524,"journal":{"name":"Asian Journal of Engineering and Applied Technology","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72937022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-05DOI: 10.51983/ajeat-2021.10.2.3063
S. Ravichandran, A. P. Babu, P. Saravanan
As an ideal for understanding portrayal and reinforcement, ontologies are broadly exhausted toward signify consumer outlines inside customized net info amassing. Though, whilst expressive person outlines, numerous fashions have exploited most effective know-how from either an international know-how sordid or a consumer insular data. Inside that article, a customized ontology version is projected pro expertise illustration and intellectual done consumer outlines. That paradigm absorbs ontological consumer outlines from each a global expertise ignoble and person neighborhood example sources. This ontology version is assessed through evaluating it in opposition to yardstick fashions inside net info jamboree. These consequences display that this ontology archetypal is an effective.
{"title":"Design and Development of an Enlightening Grid Evidence Jamboree for Modified Ontology in Consumer Outlines","authors":"S. Ravichandran, A. P. Babu, P. Saravanan","doi":"10.51983/ajeat-2021.10.2.3063","DOIUrl":"https://doi.org/10.51983/ajeat-2021.10.2.3063","url":null,"abstract":"As an ideal for understanding portrayal and reinforcement, ontologies are broadly exhausted toward signify consumer outlines inside customized net info amassing. Though, whilst expressive person outlines, numerous fashions have exploited most effective know-how from either an international know-how sordid or a consumer insular data. Inside that article, a customized ontology version is projected pro expertise illustration and intellectual done consumer outlines. That paradigm absorbs ontological consumer outlines from each a global expertise ignoble and person neighborhood example sources. This ontology version is assessed through evaluating it in opposition to yardstick fashions inside net info jamboree. These consequences display that this ontology archetypal is an effective.","PeriodicalId":8524,"journal":{"name":"Asian Journal of Engineering and Applied Technology","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84096019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-05DOI: 10.51983/ajeat-2021.10.2.3097
A. Husainy, Prasad Sawant, Sayeedahmed M. Yusuf Shaikh, Om Shashikant Virbhadre, Mayuresh Sanjay Tone
Proper storage of vegetables, fruits and food items is necessary in order to maintain their life. The shelf life of vegetables is highly dependent on temperature and humidity in storage place. Cold room and refrigeration facilities are out of budget due to advance technologies and high electricity consumption. Affordable storage facility is highly useful in such conditions. The paper aims at developing low cost, small scale evaporative cooler that operates on a principle of evaporative cooling phenomenon. The developed model has box type of structure having water holding vessel at bottom side. The proposed model has cooling fan arranged for vertical orientation with certain height partial closed as well as medium height between cooling chamber and storage chamber. The fan has been operated at two speed variants namely low speed as well as high speed for getting results at different evaporation rates. Throttling vanes have been provided through the air entering chamber which significantly affects evaporation capacity of the evaporative box. In the given range of 270 minutes of operating time during two time slots i.e.,morning and afternoon. Humiditypercentage increase from 26 to 60 is found through the experimentation while the temperature difference was reduced down to 8 degrees of difference (40 ⁰C to 32 ⁰C) through experimentation. The performance of the developed model was found better in case of throttling with fan speed parameter that includes partial throttling at high speed and medium throttling at low speed.
{"title":"Review on Preservation of Post-Harvest Vegetables by Using Evaporative Cooling Method","authors":"A. Husainy, Prasad Sawant, Sayeedahmed M. Yusuf Shaikh, Om Shashikant Virbhadre, Mayuresh Sanjay Tone","doi":"10.51983/ajeat-2021.10.2.3097","DOIUrl":"https://doi.org/10.51983/ajeat-2021.10.2.3097","url":null,"abstract":"Proper storage of vegetables, fruits and food items is necessary in order to maintain their life. The shelf life of vegetables is highly dependent on temperature and humidity in storage place. Cold room and refrigeration facilities are out of budget due to advance technologies and high electricity consumption. Affordable storage facility is highly useful in such conditions. The paper aims at developing low cost, small scale evaporative cooler that operates on a principle of evaporative cooling phenomenon. The developed model has box type of structure having water holding vessel at bottom side. The proposed model has cooling fan arranged for vertical orientation with certain height partial closed as well as medium height between cooling chamber and storage chamber. The fan has been operated at two speed variants namely low speed as well as high speed for getting results at different evaporation rates. Throttling vanes have been provided through the air entering chamber which significantly affects evaporation capacity of the evaporative box. In the given range of 270 minutes of operating time during two time slots i.e.,morning and afternoon. Humiditypercentage increase from 26 to 60 is found through the experimentation while the temperature difference was reduced down to 8 degrees of difference (40 ⁰C to 32 ⁰C) through experimentation. The performance of the developed model was found better in case of throttling with fan speed parameter that includes partial throttling at high speed and medium throttling at low speed.","PeriodicalId":8524,"journal":{"name":"Asian Journal of Engineering and Applied Technology","volume":"83 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91026993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays, young individuals in the East African community are using information and communication technologies in different ways, some as an opportunity to make a conversation with relatives and others take it as a distraction. Information and communication technology is an opportunity for young individuals to grow businesses. Young professionals need to investigate in small and medium-sized enterprises and should not only expect to get jobs elsewhere. The issue is that young professionals in the East African community cannot compete with each other when their mindset on doing business through small and medium-sized enterprises are taken differently and the levels of economic of these countries are very different. This article is motivated by the researcher’s observation analysis about young professionals in the East Africa community who know information and communication technologies, and unfortunately, they use them in a way that cannot make small and medium-sized enterprises successful. The main goal of this study is to describe information and communication technologies as an opportunity to buy or sell goods or services through small and medium-sized enterprises. This study will provide a better understanding to the lecturer, especially young professionals to take information and communication technologies positively as an opportunity to grow business through small and medium-sized enterprises and to know the strategy to use to sell products and how to manage consumer’s behavior through their needs. Young professionals need to build business skills and linkages with local and international businesses by exchanging business ideas and information via information and communication technologies.
{"title":"Is ICT a Prospect for Young Professionals to Mature Business Within SME`s in East Africa Community?","authors":"Murtaza Hussain Shaikh, Isabelle Habineza","doi":"10.24203/ajet.v9i5.6772","DOIUrl":"https://doi.org/10.24203/ajet.v9i5.6772","url":null,"abstract":"Nowadays, young individuals in the East African community are using information and communication technologies in different ways, some as an opportunity to make a conversation with relatives and others take it as a distraction. Information and communication technology is an opportunity for young individuals to grow businesses. Young professionals need to investigate in small and medium-sized enterprises and should not only expect to get jobs elsewhere. The issue is that young professionals in the East African community cannot compete with each other when their mindset on doing business through small and medium-sized enterprises are taken differently and the levels of economic of these countries are very different. This article is motivated by the researcher’s observation analysis about young professionals in the East Africa community who know information and communication technologies, and unfortunately, they use them in a way that cannot make small and medium-sized enterprises successful. The main goal of this study is to describe information and communication technologies as an opportunity to buy or sell goods or services through small and medium-sized enterprises. This study will provide a better understanding to the lecturer, especially young professionals to take information and communication technologies positively as an opportunity to grow business through small and medium-sized enterprises and to know the strategy to use to sell products and how to manage consumer’s behavior through their needs. Young professionals need to build business skills and linkages with local and international businesses by exchanging business ideas and information via information and communication technologies.","PeriodicalId":8524,"journal":{"name":"Asian Journal of Engineering and Applied Technology","volume":"107 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80550137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}