Pipe Cutting-A Different Approach
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 6
Abstract
one problem which the present invention solves is the cutting of pipes located in trenches or other points similarly difficult of access. For example, in repairing or adding connections to installed gas mains it is frequently necessary to dig a trench around the pipe and cut out a section of it preparatory to inserting a new section. On the other hand, cutting of the pipe manually is not only an expensive and laborious job but is so slow that it may seriously impair public utility service if the pipe is, say, a gas or Water main. Also precluded, in the case of a gas main Same problems as discussed above are faced during the installation and maintenance of steam carrying pipelines of boilers in the industries, the current invention overcome all of the above problems, as it increases production rate, workers safety, accuracy of work and reduces labor cost, possible chances of accidents.
Authors and Affiliations
Imran. I. Sayyad, Shubham S. Pawar, Ravishankar A. Shrirame, Amol V Raut
A Survey on the Use of 3D Password in Security
Passwords play an important role in various computing applications like ATM machines, internet services, windows login, and authentication in mobiles etc. There are many authentication techniques are available, Such as...
Analysis of Different Types of Domino Logic: A Review
Power and area will remain the main constraints in the designing of VLSI circuits. Dynamic CMOS logic circuits are broadly designed for high performance circuits due to their high speed. Conversely, the demerit of dynam...
Big Data Security Using System Logs
A series of recent high-profile security breaches have underscored that malware prevention strategies are consistently failing to adequately protect enterprises from advanced persistent threats (APTs). It’s time to embr...
A Review on Routing Protocol for Vehicular Ad-hoc Networks (VANETs)
To maintain the topology information of the entire network OLSR exchange messages from time to time for every presence of mobility and failures. HELLO, Topology Control (TC) and multiple interface declaration (MID) mess...
Privacy Preserving in Association Rule Mining
Data mining is the computer oriented process to evaluate vast database and extract the meaning of the data. Privacy is interrelated with secrecy and anonymity. Thus privacy preserving in data mining means maintaining sec...