Ekejiuba, A.I.B., Onwukwe, S.I. and Gbaden, E.T.
DOI: https://doi.org/10.5281/zenodo.10667850
Page No.: 1-4
Determination of the Pollution Parameters in Strained Yogurt Industry Wastewater
Aslı Raziye KESER and Seval Sevgi KIRDAR
DOI: https://doi.org/10.5281/zenodo.10667868
Page No.: 5-11
Development of Synthetic Bones for ANSI Chest Phantom Dosimetry
Heryani Heryani, Heri Sutanto, Choirul Anam and Ari Dwi Reskianto
DOI: https://doi.org/10.5281/zenodo.10667939
Page No.: 12-17
G. M. Shafiur Rahman, Muhammad Abdullah Al Mamun, Hrithita Aftab, Zakiya Yasmin and Mubarak A. Khan
DOI: https://doi.org/10.5281/zenodo.10668031
Page No.: 18-25
Design of a Go-Kart power Transmission system
Girish Panwar, Mohit Bayad, Kunal Daiya and Md. Zuber Khan
DOI: https://doi.org/10.5281/zenodo.10668068
Page No.: 26-33
Ergonomic Appearance of Chainsaw Operators in Forest Harvesting
Metin Tunay
DOI: https://doi.org/10.5281/zenodo.10668393
Page No.: 34-37
Solution for the Automatic Bottle Filling using PLC
Ashutosh Sharma, Bhupesh Jain, Mahaveer Teli and Mahendra Kumar Salvi
DOI: https://doi.org/10.5281/zenodo.10668472
Page No.: 38-40
Transmission System of Student Formula-1 SAE Car
Deepesh Singh, Jai Sharma, Indresh Sindhal and Mukesh Lohar
DOI: https://doi.org/10.5281/zenodo.10668478
Page No.: 41-44
Arun Pandiyan Perumal
DOI: https://doi.org/10.5281/zenodo.11079404
Page No.: 45-50
Water Leakage Detection Using Machine Learning & Wireless Sensors Network (IoT)
Siva Sathyanarayana Movva
DOI: https://doi.org/10.5281/zenodo.13235665
Page No.: 51-68
Interdisciplinary Collaboration in System Integration: Bridging Gaps Between Engineering Disciplines
Pratik Bansal
DOI: https://doi.org/10.5281/zenodo.11408087
Page No.: 69-70
Exploring The Efficacy of Mutation Testing in Detecting Software Faults: A Systematic Review
Kodanda Rami Reddy Manukonda
DOI: https://doi.org/10.5281/zenodo.11408273
Page No.: 71-77
Automating Software Testing: A Comparative Study of Machine Learning and Traditional Approaches
Kodanda Rami Reddy Manukonda
DOI: https://doi.org/10.5281/zenodo.11408295
Page No.: 78-84
An In-Depth Exploration of Techniques for Utilizing Big Data in Network Security Analytics
Kartheek Pamarthi
DOI: https://doi.org/10.5281/zenodo.13326086
Page No.: 85-93
Studying The Effectiveness of Current Cybersecurity Measures
Mohammed Mustafa Khan
Page No.: 94-99
Tanmaya Gaur
Page No.: 100-108