Sustainable Processes Using Sub- and Super Critical Fluids
نویسندگان
چکیده
منابع مشابه
Chemistry and Transport in Super and Sub-Critical Fluids
This report focuses on the technical approach that was outlined in the research proposal as well as the work that has been initiated since the start of this project. The first section summarizes the general technical approach on which this research is based. The remaining sections describe the studies that have been initiated since the project began and present some of the pertinent, preliminar...
متن کاملDevelopment of an Implicit Numerical Model for Calculation of SUB-and Super-Critical Flows
A two dimensional numerical model of shallow water equations was developed to calculate sub and super-critical open channel flows. Utilizing an implicit scheme the steady state equations were discretized based on a control volume method. Collocated grid arrangement was applied with a SIMPLEC like algorithm for depth-velocity coupling. A power law scheme was used for discretization of convection...
متن کاملDevelopment of an Implicit Numerical Model for Calculation of Sub and Super Critical Flows
A two dimensional numerical model of shallow water equations was developed tocalculate sub and super-critical open channel flows. Utilizing an implicit scheme the steady stateequations were discretized based on control volume method. Collocated grid arrangement was appliedwith a SIMPLEC like algorithm for depth-velocity coupling. Power law scheme was used fordiscretization of convection and dif...
متن کاملSuper-Resolution Using Sub-Band Self-Similarity
A popular approach for single image super-resolution (SR) is to use scaled down versions of the given image to build an internal training dictionary of pairs of low resolution (LR) and high resolution (HR) image patches, which is then used to predict the HR image. This self-similarity approach has the advantage of not requiring a separate external training database. However, due to their limite...
متن کاملSuper Critical and Sub Critical Regimes of Percolation with Secure Communication
Percolation in an information-theoretically secure graph is considered where both the legitimate and the eavesdropper nodes are distributed as Poisson point processes. For both the path-loss and the path-loss plus fading model, upper and lower bounds on the minimum density of the legitimate nodes (as a function of the density of the eavesdropper nodes) required for non-zero probability of havin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Engineering
سال: 2012
ISSN: 1877-7058
DOI: 10.1016/j.proeng.2012.07.573