Skip to Main Content
Skip Nav Destination
AIP Conference Proceedings Cover Image for Volume 3157, Issue 1
Current Issue
Volume 3157,
Issue 1,
21 April 2025

AIP Conference Proceedings has been a trusted publishing partner for more than 40 years, delivering fast, affordable, and versatile publishing for maximum exposure of your meeting’s key research. Our conference proceedings program reports the findings presented at scientific meetings from large international conferences to small specialist workshops. Subject areas span the physical sciences, including physics, math, chemistry, materials science, and engineering.

Most Recent
Research Article
Gazal Sharma, Rajat Singh et al.
A multi-objective method is used to look into how to include sustainable factors in the process of optimizing manufacturing systems in this work. A detailed approach is also given, and the results ...
Research Article
Namita Kaur, Sanjay Singh Chauhan et al.
The objective of this study is to enhance work processes in a manufacturing setting via the use of a systematic methodology. This is achieved by the implementation of meticulous time and motion ...
Research Article
Saurav Dixit, Sudhir Jugran et al.
The purpose of this in-depth research is to evaluate the ways in which Small and Medium-sized Enterprises (SMEs) in the construction sector might use the concepts of Lean Construction and Building ...
Research Article
Madhusoodanan Nair Manivilasam, Rajendra Prasad Koneti et al.
Many researchers have used different methods to construct Hadamard matrices. [4,5,6,7,8,9,10,11,12]. Here in this paper a particular type of SBIBD designs are used to construct the Hadamard matrices.
Research Article
Vegesna Lakshmi, Lakshmi Prasanna Yeluri et al.
Even with the aid of a blind man’s stick, uneven roads pose difficulties for those who are visually impaired. They might lose control of the blind man’s stick if they kick something, fall, or both. ...
Research Article
Adidela Rajya Lakshmi, Laxman Bodhan et al.
Authentication and key management are critical components in ensuring the security of information systems and data. This paper presents a comprehensive model for the Authentication and Management of ...
Close Modal

or Create an Account

Close Modal
Close Modal