Enhancing The Ic Engine Performance By Using The ElectrolysisAnd Preheating Process
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract:Our present fuel resources are not going to be around forever and with the ever increasing consumption their extinction is nearly unavoidable. Also our fuel resources which are mostly made up of fossil fuels are not renewable in nature. Currently around the world the consumption of fossil fuels is 100,000 times faster than their natural production. According to an estimate the demand for these fuels will suddenly outstrip their availability in a matter of centuries-or less. Also the combustion of fossil fuels emits carbon dioxide. This harmful gas when released into the atmosphere makes a huge contribution to the greenhouse effect. This effect prompts the atmosphere to capture and reflect back the energy that radiate from the surface of the earth, instead of letting them to escape back into space. This causes global warming that melts the polar ice caps and affects weather all around the world. This project is discusses about the variability of using H2 as a fuel along with petroleum. There are many reasons to choose H2 as a motive power.H2 has one of the highest gravimetric energy densities of all available fuels, which means it has very high energy content per unit mass (143MJ/kg) 40% more than other. Also we have to preheat the inlet air to get the more efficient for the performance of engine.
Authors and Affiliations
Dr. R. Sudhakaran , G. Aravinthkumar , M. Naveenkumar , S. Veerakumar , M. Vigneshvar
Enhancing Security Of Publish/Subscribe System Using Identity Based Encryption Model
Abstract: In a content based publish subscribe system providing security related to the events or messages and subscriptions is very difficult. This paper presents approach to provide security in a Broker-less Publish/Su...
An Efficient implementation of PKI architecture based Digital Signature using RSA and various hash functions (MD5 and SHA variants
Digital Signature technique is widely being used to detect unauthorized modification to data and to authenticate the identity of the signatory. It is essential for secure transaction over unsecure/ open networks....
An Efficient Hybrid Multilevel Intrusion Detection System in Cloud Environment
Abstract: Cloud Computing offers latest computing paradigm where application, data and IT services are provided online over the Internet. One of the significant concerns in Cloud Computing is security. Since data is expo...
Novel Hybrid k-D-Apriori Algorithm for Web Usage Mining
Abstract: The Web usage mining is a branch of web mining in which by clustering the datasets, frequently accessed patterns can be obtained for betterment of social portals, websites. The divisive analysis is one of the t...
Analyzing Process Behavior to Predict Resource Allocation in Distributed Environment by Using Time Series and Online Predictive Approach Algorithm
Abstract:A distributed system is a collection of different computers to handle large amount of data, the connected computers can share and coordinate their data on network. It is very difficult to for server to han...