Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (610)
  • Open Access

    ARTICLE

    Theoretical and Experimental Investigation of Water Flow through Porous Ceramic Clay Composite Water Filter

    A. K. Plappally1,3, I. Yakub2,3, L. C. Brown1,2,3, A. B. O. Soboyejo1

    FDMP-Fluid Dynamics & Materials Processing, Vol.5, No.4, pp. 373-398, 2009, DOI:10.3970/fdmp.2009.005.373

    Abstract Water flow through point-of-use porous ceramic water treatment filters have been theoretically analyzed in this technical paper. Filters tested were manufactured by combining low cost materials namely, clay and sawdust. Three filters with distinct volume fractions of clay to sawdust (75:25, 65:35 and 50:50) were tested. Sintered clay filters casted in frustum shapes were structurally characterized using mercury intrusion porosimetry. A linear increase in porosity with volume fraction of sawdust was observed. Flow experiments were carried out at constant room temperature and pressure. Potable tap water was used in these studies. Flows through filters occurring with drop in the head… More >

  • Open Access

    ARTICLE

    Three-dimensional Simulations of Water-Mercury Anticonvection

    Thomas Boeck1, Alexander Nepomnyashchy2,3, Ilya Simanovskii2

    FDMP-Fluid Dynamics & Materials Processing, Vol.4, No.1, pp. 11-20, 2008, DOI:10.3970/fdmp.2008.004.011

    Abstract Anticonvection in a two-layer system of mercury and water is studied using three-dimensional direct numerical simulations with a Fourier-Chebyshev spectral method. The two fluid layers have equal thicknesses and are uniformly heated from above. Interface deformations and surface tension gradients are neglected. The quiescent state is replaced by steady hexagons upon increasing the heating from above. We investigate the destabilization of this primary convective pattern in a small and in a large computational domain upon increasing the temperature difference across the two fluid layers. For the large domain the convection cells become disordered at about twice the critical temperature difference… More >

  • Open Access

    ARTICLE

    Influence of Layer Height on Thermal Buoyancy Convection in A System with Two Superposed Fluids Confined in A Parallelepipedic Cavity

    Sunil Punjabi1, K. Muralidhar2, P. K. Panigrahi2

    FDMP-Fluid Dynamics & Materials Processing, Vol.2, No.2, pp. 95-106, 2006, DOI:10.3970/fdmp.2006.002.095

    Abstract Convection in a differentially heated two-layer system consisting of air and water was studied experimentally, using laser-interferometry. The cavity used for flow visualization was square in cross-section and rectangular in-plan having dimensions of 447 × 32 × 32 mm3. Experiments performed over different layer thicknesses of water filled in a square cross-section cavity, the rest being air, are reported in the present work. The following temperature differences for each layer height were imposed across the hot and the cold walls of the superposed fluid layers: (i) ΔT=10K and (ii)ΔT =18 K. The present study was aimed at understanding the following… More >

  • Open Access

    ARTICLE

    An Experimental Study on Enhancing Cooling Rates of Low Thermal Conductivity Fluids Using Liquid Metals

    S.-A. B. Al Omari1,2, E. Elnajjar1

    FDMP-Fluid Dynamics & Materials Processing, Vol.9, No.2, pp. 91-109, 2013, DOI:10.3970/fdmp.2013.009.091

    Abstract In a previous numerical study (Al Omari, Int. Communication in Heat and Mass Transfer, 2011) the heat transfer enhancement between two immiscible liquids with clear disparity in thermal conductivity such as water and a liquid metal (attained by co- flowing them in a direct contact manner alongside each other in mini channel) was demonstrated. The present work includes preliminary experimental results that support those numerical findings. Two immiscible liquids (hot water and liquid gallium) are allowed experimentally to exchange heat (under noflow conditions) in a stationary metallic cup where they are put in direct contact. The experimental results confirm the… More >

  • Open Access

    ARTICLE

    A Quasi-Boundary Semi-Analytical Method for Backward in Time Advection-Dispersion Equation

    Chein-Shan Liu1, Chih-Wen Chang2, Jiang-Ren Chang2,3

    CMC-Computers, Materials & Continua, Vol.9, No.2, pp. 111-136, 2009, DOI:10.3970/cmc.2009.009.111

    Abstract In this paper, we take the advantage of an analytical method to solve the advection-dispersion equation (ADE) for identifying the contamination problems. First, the Fourier series expansion technique is employed to calculate the concentration field C(x, t) at any time t< T. Then, we consider a direct regularization by adding an extra term αC(x,0) on the final condition to carry off a second kind Fredholm integral equation. The termwise separable property of the kernel function permits us to transform itinto a two-point boundary value problem. The uniform convergence and error estimate of the regularized solution Cα(x,t) are provided and a… More >

  • Open Access

    ARTICLE

    A Robust Zero-Watermarking Based on SIFT-DCT for Medical Images in the Encrypted Domain

    Jialing Liu1, Jingbing Li1,2,*, Yenwei Chen3, Xiangxi Zou1, Jieren Cheng1,2, Yanlin Liu1, Uzair Aslam Bhatti1,2

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 363-378, 2019, DOI:10.32604/cmc.2019.06037

    Abstract Remote medical diagnosis can be realized by using the Internet, but when transmitting medical images of patients through the Internet, personal information of patients may be leaked. Aim at the security of medical information system and the protection of medical images, a novel robust zero-watermarking based on SIFT-DCT (Scale Invariant Feature Transform-Discrete Cosine Transform) for medical images in the encrypted domain is proposed. Firstly, the original medical image is encrypted in transform domain based on Logistic chaotic sequence to enhance the concealment of original medical images. Then, the SIFT-DCT is used to extract the feature sequences of encrypted medical images.… More >

  • Open Access

    ARTICLE

    A Method of Obtaining Catchment Basins with Contour Lines for Foam Image Segmentation

    Yanpeng Wu1, Xiaoqi Peng1,*, Mohammad Nur2, Hengfu Yang1

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1155-1170, 2019, DOI:10.32604/cmc.2019.06123

    Abstract Foam image segmentation, represented by watershed algorithm, is wildly used in the extraction of bubble morphology features. H-minima transformation was proved to be effective in locating the catchment basins in the traditional watershed segmentation method. To further improve the accuracy of watershed segmentation, method of top-bottom-cap filters and method of morphological reconstruction were implied to marking the catchment basins. In this paper, instead of H-minima transformation, a method of contour lines is specially proposed to obtain the catchment basins for foam image segmentation by using top-bottom-cap filters and less morphological reconstruction. Experimental results in foam segmentation show that the proposed… More >

  • Open Access

    ARTICLE

    A Dual-Chaining Watermark Scheme for Data Integrity Protection in Internet of Things

    Baowei Wang1,2,*, Weiwen Kong1, Wei Li1, Neal N. Xiong3

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 679-695, 2019, DOI:10.32604/cmc.2019.06106

    Abstract Chaining watermark is an effective way to verify the integrity of streaming data in wireless network environment, especially in resource-constrained sensor networks, such as the perception layer of Internet of Things applications. However, in all existing single chaining watermark schemes, how to ensure the synchronization between the data sender and the receiver is still an unsolved problem. Once the synchronization points are attacked by the adversary, existing data integrity authentication schemes are difficult to work properly, and the false negative rate might be up to 50 percent. And the additional fixed group delimiters not only increase the data size, but… More >

  • Open Access

    ARTICLE

    A Robust Image Watermarking Scheme Using Z-Transform, Discrete Wavelet Transform and Bidiagonal Singular Value Decomposition

    N. Jayashree1,*, R. S. Bhuvaneswaran1

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 263-285, 2019, DOI:10.32604/cmc.2019.03924

    Abstract Watermarking is a widely used solution to the problems of authentication and copyright protection of digital media especially for images, videos, and audio data. Chaos is one of the emerging techniques adopted in image watermarking schemes due to its intrinsic cryptographic properties. This paper proposes a new chaotic hybrid watermarking method combining Discrete Wavelet Transform (DWT), Z-transform (ZT) and Bidiagonal Singular Value Decomposition (BSVD). The original image is decomposed into 3-level DWT, and then, ZT is applied on the HH3 and HL3 sub-bands. The watermark image is encrypted using Arnold Cat Map. BSVD for the watermark and transformed original image… More >

  • Open Access

    ARTICLE

    ia-PNCC: Noise Processing Method for Underwater Target Recognition Convolutional Neural Network

    Nianbin Wang1, Ming He1,2, Jianguo Sun1,*, Hongbin Wang1, Lianke Zhou1, Ci Chu1, Lei Chen3

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 169-181, 2019, DOI:10.32604/cmc.2019.03709

    Abstract Underwater target recognition is a key technology for underwater acoustic countermeasure. How to classify and recognize underwater targets according to the noise information of underwater targets has been a hot topic in the field of underwater acoustic signals. In this paper, the deep learning model is applied to underwater target recognition. Improved anti-noise Power-Normalized Cepstral Coefficients (ia-PNCC) is proposed, based on PNCC applied to underwater noises. Multitaper and normalized Gammatone filter banks are applied to improve the anti-noise capacity. The method is combined with a convolutional neural network in order to recognize the underwater target. Experiment results show that the… More >

Displaying 591-600 on page 60 of 610. Per Page