Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (181)
  • Open Access

    ARTICLE

    Experimental Study on the Influence of Fracturing Fluid Retention on Shale Gas Diffusion Law

    Zhiyuan Yao1,2,3, Jing Sun1,2,3,*, Dehua Liu1,2,3

    Energy Engineering, Vol.120, No.8, pp. 1853-1866, 2023, DOI:10.32604/ee.2023.025846

    Abstract Shale gas reservoirs have poor physical properties and a large number of micro-nano pores have been developed. Shale gas wells have no natural productivity and need fracturing reconstruction measures to put into production. However, the fracturing fluid will enter the reservoir space of shale matrix after fracturing and affect the production of shale gas. At present, there is no consensus on the influence of fracturing fluid retention on gas well production. Based on this, the paper adopts gas molecular transport analyzer to carry out experimental research on the influence of fracturing fluid on shale gas diffusion law after entering matrix… More >

  • Open Access

    ARTICLE

    DOUBLE DIFFUSIVE NATURAL CONVECTION IN OPEN CAVITY UNDER THE SORET AND DUFOUR EFFECTS

    Zhiyun Wang , Zixuan Zhou, Mo Yang

    Frontiers in Heat and Mass Transfer, Vol.14, pp. 1-7, 2020, DOI:10.5098/hmt.14.13

    Abstract Double diffusive natural convection in an open cavity under the Soret and Dufour effect is simulated numerically. The influences of different Rayleigh numbers (range from 103 to 107), Lewis numbers (range from 0.5 to 8), buoyancy ratios (range from -5 to 5) and Soret and Dufour (range from 0 to 0.5) on the flow field, temperature and concentration distributions, as well as on the variation of the average Nusselt number and the average Sherwood number are investigated. The result shows that, when buoyancy ratios is -1, the average Nusselt number and the average Sherwood number reaches the minimum, namely the… More >

  • Open Access

    ARTICLE

    EFFECT OF DIFFUSION-THERMO ON MHD FLOW OF MAXWELL FLUID WITH HEAT AND MASS TRANSFER

    Muhammad Ramzana,*, Zaib Un Nisab , Mudassar Nazara,c,†

    Frontiers in Heat and Mass Transfer, Vol.19, pp. 1-9, 2022, DOI:10.5098/hmt.19.12

    Abstract A magnetohydrodynamics (MHD) flow of fractional Maxwell fluid past an exponentially accelerated vertical plate is considered. In addition, other factors such as heat generation and chemical reaction are used in the problem. The flow model is solved using Caputo fractional derivative. Initially, the governing equations are made non-dimensional and then solved by Laplace transform. The influence of different parameters like diffusion thermo, fractional parameter, Magnetic field, chemical reaction, Prandtl number and Maxwell parameter are discussed through numerous graphs. From figures, it is observed that fluid motion decreases with increasing values of Schmidt number and chemical reaction, whereas velocity field decreases… More >

  • Open Access

    ARTICLE

    MHD FLOW OF JEFFREY FLUID WITH HEAT ABSORPTION AND THERMO-DIFFUSION

    Ahmad Shafiquea , Muhammad Ramzana,*, Zubda Ikrama, M. Amira, Mudassar Nazara

    Frontiers in Heat and Mass Transfer, Vol.20, pp. 1-10, 2023, DOI:10.5098/hmt.20.4

    Abstract Unsteady flow of fractionalized Jeffrey fluid over a plate is considered. In addition, thermo diffusion and slip effects are also used in the problem. The flow model is solved using Constant proportional Caputo fractional derivative. Initially, the governing equations are made non-dimensional and then solved by Laplace transform. From the Figs., it is observed that Prandtl and Smith numbers have decreasing effect on fluid motion, whereas thermodiffusion have increasing effect on fluid motion. Moreover, comparison among fractionalized and ordinary velocity fields is also drawn. More >

  • Open Access

    ARTICLE

    Dual Image Cryptosystem Using Henon Map and Discrete Fourier Transform

    Hesham Alhumyani*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2933-2945, 2023, DOI:10.32604/iasc.2023.034689

    Abstract This paper introduces an efficient image cryptography system. The proposed image cryptography system is based on employing the two-dimensional (2D) chaotic henon map (CHM) in the Discrete Fourier Transform (DFT). The proposed DFT-based CHM image cryptography has two procedures which are the encryption and decryption procedures. In the proposed DFT-based CHM image cryptography, the confusion is employed using the CHM while the diffusion is realized using the DFT. So, the proposed DFT-based CHM image cryptography achieves both confusion and diffusion characteristics. The encryption procedure starts by applying the DFT on the image then the DFT transformed image is scrambled using… More >

  • Open Access

    ARTICLE

    Modeling of Hydrogen Blending on the Leakage and Diffusion of Urban Buried Hydrogen-Enriched Natural Gas Pipeline

    Yue Su1, Jingfa Li2,*, Bo Yu2, Yanlin Zhao1, Dongxu Han2, Dongliang Sun2

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1315-1337, 2023, DOI:10.32604/cmes.2023.026035

    Abstract With the introduction of various carbon reduction policies around the world, hydrogen energy, as a kind of clean energy with zero carbon emission, has attracted much attention. The safe and economical transportation of hydrogen is of great significance to the development of hydrogen energy industries. Utilizing natural gas pipelines to transport hydrogen is considered to be an efficient and economical way. However, hydrogen has a higher risk of leakage due to its strong diffusion capacity and lower explosive limit than conventional natural gas. Therefore, it is of great significance to study the leakage and diffusion law of hydrogen-enriched natural gas… More > Graphic Abstract

    Modeling of Hydrogen Blending on the Leakage and Diffusion of Urban Buried Hydrogen-Enriched Natural Gas Pipeline

  • Open Access

    ARTICLE

    A Novel Lightweight Image Encryption Scheme

    Rawia Abdulla Mohammed1,*, Maisa’a Abid Ali Khodher1, Ashwak Alabaichi2

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2137-2153, 2023, DOI:10.32604/cmc.2023.036861

    Abstract Encryption algorithms are one of the methods to protect data during its transmission through an unsafe transmission medium. But encryption methods need a lot of time during encryption and decryption, so it is necessary to find encryption algorithms that consume little time while preserving the security of the data. In this paper, more than one algorithm was combined to obtain high security with a short implementation time. A chaotic system, DNA computing, and Salsa20 were combined. A proposed 5D chaos system was used to generate more robust keys in a Salsa algorithm and DNA computing. Also, the confusion is performed… More >

  • Open Access

    ARTICLE

    Identifying Influential Communities Using IID for a Multilayer Networks

    C. Suganthini*, R. Baskaran

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1715-1731, 2023, DOI:10.32604/iasc.2023.034019

    Abstract In online social networks (OSN), they generate several specific user activities daily, corresponding to the billions of data points shared. However, although users exhibit significant interest in social media, they are uninterested in the content, discussions, or opinions available on certain sites. Therefore, this study aims to identify influential communities and understand user behavior across networks in the information diffusion process. Social media platforms, such as Facebook and Twitter, extract data to analyze the information diffusion process, based on which they cascade information among the individuals in the network. Therefore, this study proposes an influential information diffusion model that identifies… More >

  • Open Access

    ARTICLE

    A Hybridized Artificial Neural Network for Automated Software Test Oracle

    K. Kamaraj1,*, B. Lanitha2, S. Karthic3, P. N. Senthil Prakash4, R. Mahaveerakannan5

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1837-1850, 2023, DOI:10.32604/csse.2023.029703

    Abstract Software testing is the methodology of analyzing the nature of software to test if it works as anticipated so as to boost its reliability and quality. These two characteristics are very critical in the software applications of present times. When testers want to perform scenario evaluations, test oracles are generally employed in the third phase. Upon test case execution and test outcome generation, it is essential to validate the results so as to establish the software behavior’s correctness. By choosing a feasible technique for the test case optimization and prioritization as along with an appropriate assessment of the application, leads… More >

  • Open Access

    ARTICLE

    Computational Modeling of Reaction-Diffusion COVID-19 Model Having Isolated Compartment

    Muhammad Shoaib Arif1,2,*, Kamaleldin Abodayeh1, Asad Ejaz2

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.2, pp. 1719-1743, 2023, DOI:10.32604/cmes.2022.022235

    Abstract Cases of COVID-19 and its variant omicron are raised all across the world. The most lethal form and effect of COVID-19 are the omicron version, which has been reported in tens of thousands of cases daily in numerous nations. Following WHO (World health organization) records on 30 December 2021, the cases of COVID-19 were found to be maximum for which boarding individuals were found 1,524,266, active, recovered, and discharge were found to be 82,402 and 34,258,778, respectively. While there were 160,989 active cases, 33,614,434 cured cases, 456,386 total deaths, and 605,885,769 total samples tested. So far, 1,438,322,742 individuals have been… More >

Displaying 41-50 on page 5 of 181. Per Page