Sustainable Processes Using Sub- and Super Critical Fluids

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Chemistry and Transport in Super and Sub-Critical Fluids

This report focuses on the technical approach that was outlined in the research proposal as well as the work that has been initiated since the start of this project. The first section summarizes the general technical approach on which this research is based. The remaining sections describe the studies that have been initiated since the project began and present some of the pertinent, preliminar...

متن کامل

Development of an Implicit Numerical Model for Calculation of SUB-and Super-Critical Flows

A two dimensional numerical model of shallow water equations was developed to calculate sub and super-critical open channel flows. Utilizing an implicit scheme the steady state equations were discretized based on a control volume method. Collocated grid arrangement was applied with a SIMPLEC like algorithm for depth-velocity coupling. A power law scheme was used for discretization of convection...

متن کامل

Development of an Implicit Numerical Model for Calculation of Sub and Super Critical Flows

A two dimensional numerical model of shallow water equations was developed tocalculate sub and super-critical open channel flows. Utilizing an implicit scheme the steady stateequations were discretized based on control volume method. Collocated grid arrangement was appliedwith a SIMPLEC like algorithm for depth-velocity coupling. Power law scheme was used fordiscretization of convection and dif...

متن کامل

Super-Resolution Using Sub-Band Self-Similarity

A popular approach for single image super-resolution (SR) is to use scaled down versions of the given image to build an internal training dictionary of pairs of low resolution (LR) and high resolution (HR) image patches, which is then used to predict the HR image. This self-similarity approach has the advantage of not requiring a separate external training database. However, due to their limite...

متن کامل

Super Critical and Sub Critical Regimes of Percolation with Secure Communication

Percolation in an information-theoretically secure graph is considered where both the legitimate and the eavesdropper nodes are distributed as Poisson point processes. For both the path-loss and the path-loss plus fading model, upper and lower bounds on the minimum density of the legitimate nodes (as a function of the density of the eavesdropper nodes) required for non-zero probability of havin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Engineering

سال: 2012

ISSN: 1877-7058

DOI: 10.1016/j.proeng.2012.07.573