Volume 11 Issue 2 2024

Efficient Parking Management through QR Technology
Mohammad Fokhrul Islam Buian, Iqtiar Md Siddique, Anamika Ahmed Siddique
DOI: https://zenodo.org/records/10671733
Page No. 1-9

A Research Study on the Influence of Financial Technology in the Banking Industry of India
Dr. Diksha Shrimali & Dr. Kunal Ahuja
DOI: https://zenodo.org/records/10688197
Page No. 10-14

Thermogravimetric and Thermomechanical Analysis of Abrasive Elaborated with Vitalleria Paradoxa Tannin Adhesive and Balanites aegyptiaca hulls Particules
Noel KONAI, Benoit NDIWE, Antonio PIZZI, KARGA TAPSIA Lionel
Page No. 15-27

Thermogravimetric and Thermomechanical Analysis of Abrasive Elaborated with Vitalleria Paradoxa Tannin Adhesive and Balanites aegyptiaca hulls Particules
Noel KONAI, Benoit NDIWE, Antonio PIZZI, KARGA TAPSIA Lionel
Page No. 15-27

Modelling Dead Oil Viscosity Using Extreme Gradient Boosting Machine Learning for Niger Delta Region
Origbo Oghenechovwe Augustine, Mbachu Ijeoma Irene
Page No. 28-38

Research on the Characteristics of Gas-Liquid Two-Phase Flow in Coal Pores under Different Displacement Pressures
Ming Yang, Ya Li, Jianliang Gao, Qi Liu, Xuebo Zhang
Page No. 39-51

Modeling the Manyas-Turkey Depression Area with the Dykes Approach
Ali Muhittin Albora
Page No. 52-57

Agriculture in Europe
Matthew N. O. Sadiku, Chandra M. M. Kotteti, and Janet O. Sadiku
Page No. 58-65

Efficient Parking Management through QR Technology
Mohammad Fokhrul Islam Buian, Iqtiar Md Siddique, Anamika Ahmed Siddique
Page No. 66-74

Lithology Determination with Well Log Measurements
Ali Muhittin ALBORA
Page No. 75-81

Adaptive Risk Management and Resilience in Automated Electronics Industry
Md. Ismail Hasan, Md. Towhid Alom Tutul, Suman Das, Iqtiar Md Siddique
DOI: https://zenodo.org/records/10776947
Page No. 82-92

Computational fluid dynamics analysis of the influence of velocity at inlet 2 on heat transfer and fluid flow in the mixing elbow
Pape Tamsir Ndiaye, Omar Ngor Thiam
Page No. 93-101

Effect of Nano-Weighted Colloidal Particles on Mud Telemetry Velocity while Drilling Hydrocarbon Wells
Emmanuel Emeka Okoro, Oscar I.O. Ogali
Page No. 102-112

Consideration of Failure Time in Linear Poroelastic Constitutive Model for Formation Failure during Drilling Operation
Okoro Emeka Emmanuel, Ogali I.O. Oscar
Page No. 113-119

Evaluation of emergency rescue capability for general aviation based on cone analytic network process
LIANG Zhuping,JIANG Fang, JING Guoxun, WANG Yuansheng
Page No. 120-128

A Review of Adaptive Signal Control Systems Based on Changes in Traffic Environments
Y. L. Ren
Page No. 129-134

Teachers’ Views and Practices Relating to the Teaching of Mathematics in other Disciplines
Moslema Jahan
Page No. 135-139

Performance Test of Grain Cleaner in Conjunction with Maize Sheller
P.F Makinde, Prof. A.F Adisa
Page No. 140-150

Forecast and analysis of the number of fatalities in major coal mine accidents
Guoxun Jing, Xiaoyu Ma, Fang Jiang
Page No. 151-159

Comparison of earthquake activities occurring in the Van region with the Bouguer anomaly map
Ali Muhittin Albora
Page No. 160-167

A Quick and Standard Pharmaceutical Industrial Approach to Develop a Robust Analytical Method by HPLC
Dr. Subba Reddy Alla, Ramanjaneyulu Seemaladinne, Dr. Srikanth Cheemalapati, Ojas Prakashbhai Doshi
Page No. 168-173

Current status of cold start research on proton exchange membrane fuel cells
Rui Dang, Zhenhao Liu
Page No. 174-181

Research on recoverable range of upward mining in room-and-pillar residual mining area
Zihan Yang, Le Xu
Page No. 182-189

Research on mine pressure law of working face passing through the boundary of overlying goaf
Zihan Yang
Page No. 190-198

Integrating Artificial Intelligence & Generative Ai into Oracle Human Capital Management
Sai Raj Kondogi Shiridi
Page No. 199-201

Blockchain Technology in ETC: Enhancing Security and Transparency in Financial Transactions
Pankaj Lembhe
Page No. 202-212

Firmware Security with ML: Explore Machine Learning Techniques for the Analysis of Firmware in Semiconductor Devices to Uncover Potential Security Flaws and Backdoors
Rajat Suvra Das
Page No. 213-221