Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (327)
  • Open Access

    ARTICLE

    NUMERICAL INVESTIGATIONS ON COMBUSTION AND EMISSION CHARACTERISTICS IN A DIRECT INJECTION DIESEL ENGINE AT ELEVATED FUEL TEMPERATURES

    Manimaran Renganathan, Thundil Karuppa Raj Rajagopal*

    Frontiers in Heat and Mass Transfer, Vol.4, No.1, pp. 1-11, 2013, DOI:10.5098/hmt.v4.1.3008

    Abstract In this work, fuel spray parameters are studied by varying the fuel temperature. To overcome the tedious experimental task, a 3-D Computational Fluid Dynamics methodology is adopted by injecting fuel at specified temperatures of 313 K, 353 K and 393 K. The validation is accomplished after the optimal spatial and temporal steps of discretization are found out. At a fuel temperature of 313 K, advancing the injection timing from 6 deg bTDC to 20 deg bTDC increases cylinder peak pressure from 79.8 bar to 90.9 bar. Relation between the emission characteristics and spray SMD and temperature is studied. More >

  • Open Access

    ARTICLE

    EFFECT OF MAGNETIC FIELD ON INDIRECT NATURAL CONVECTION FLOW ABOVE A HORIZONTAL HOT FLAT PLATE

    Tapas Ray Mahapatraa, Sumanta Siduib, Samir Kumar Nandyc,*

    Frontiers in Heat and Mass Transfer, Vol.5, pp. 1-15, 2014, DOI:10.5098/hmt.5.15

    Abstract The effect of variable transverse magnetic field on steady two-dimensional indirect natural convection flow of an incompressible viscous fluid over a horizontal hot flat plate is theoretically studied. The governing partial differential equations are transformed into ordinary ones by similarity transformation and solved numerically using fourth order Runge-Kutta method with shooting technique. The results are obtained for the skin friction coefficient and the local Nusselt number as well as the dimensionless velocities, temperature for some values of the magnetic parameter (M) subject to either prescribed (constant or variable) surface temperature or prescribed (variable) heat flux. It is seen that the… More >

  • Open Access

    ARTICLE

    CFD MODELLING AND VALIDATION OF COMBUSTION IN DIRECT INJECTION COMPRESSION IGNITION ENGINE FUELLED WITH JATROPHA OIL BLENDS WITH DIESEL

    Biswajit De*, Rajsekhar Panua

    Frontiers in Heat and Mass Transfer, Vol.5, pp. 1-6, 2014, DOI:10.5098/hmt.5.7

    Abstract This paper presents a pre-mixed combustion model for diesel and Jatropha oil blends combustion studies. Jatropha oil blends are considered as a mixture of diesel and Jatropha oil. CFD package, FLUENT 6.3 is used for modeling the complex combustion phenomenon in compression ignition engine. The experiments are carried out on a single cylinder, four strokes, water cooled direct injection compression ignition engine at compression ratio of 17.5 at full load condition at constant speed of 1500 rpm fuelled with diesel and jatropha oil blends with diesel. The numerical model is solved by considering pressure based, implicit and unsteady solver and… More >

  • Open Access

    ARTICLE

    COMPUTATIONAL STUDIES OF SWIRL RATIO AND INJECTION TIMING ON ATOMIZATION IN A DIRECT INJECTION DIESEL ENGINE

    Renganathan Manimarana, Rajagopal Thundil Karuppa Rajb,*

    Frontiers in Heat and Mass Transfer, Vol.5, pp. 1-9, 2014, DOI:10.5098/hmt.5.2

    Abstract Diesel engine combustion modeling presents a challenging task with the formation and breakup of spray into droplets. In this work, 3D-CFD computations are performed to understand the behaviour of spray droplet diameter and temperature during the combustion by varying the swirl ratio and injection timing. After the validation and grid and time independency tests, it is found that increase in swirl ratio from 1.4 to 4.1 results in peak pressure rise of 8 bar and an advancement of injection timing from 6 deg bTDC to 20 deg bTDC results in increase of peak pressure by 15 %. More >

  • Open Access

    ARTICLE

    C2Net-YOLOv5: A Bidirectional Res2Net-Based Traffic Sign Detection Algorithm

    Xiujuan Wang1, Yiqi Tian1,*, Kangfeng Zheng2, Chutong Liu3

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1949-1965, 2023, DOI:10.32604/cmc.2023.042224

    Abstract Rapid advancement of intelligent transportation systems (ITS) and autonomous driving (AD) have shown the importance of accurate and efficient detection of traffic signs. However, certain drawbacks, such as balancing accuracy and real-time performance, hinder the deployment of traffic sign detection algorithms in ITS and AD domains. In this study, a novel traffic sign detection algorithm was proposed based on the bidirectional Res2Net architecture to achieve an improved balance between accuracy and speed. An enhanced backbone network module, called C2Net, which uses an upgraded bidirectional Res2Net, was introduced to mitigate information loss in the feature extraction process and to achieve information… More >

  • Open Access

    ARTICLE

    PoIR: A Node Selection Mechanism in Reputation-Based Blockchain Consensus Using Bidirectional LSTM Regression Model

    Jauzak Hussaini Windiatmaja, Delphi Hanggoro, Muhammad Salman, Riri Fitri Sari*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2309-2339, 2023, DOI:10.32604/cmc.2023.041152

    Abstract This research presents a reputation-based blockchain consensus mechanism called Proof of Intelligent Reputation (PoIR) as an alternative to traditional Proof of Work (PoW). PoIR addresses the limitations of existing reputation-based consensus mechanisms by proposing a more decentralized and fair node selection process. The proposed PoIR consensus combines Bidirectional Long Short-Term Memory (BiLSTM) with the Network Entity Reputation Database (NERD) to generate reputation scores for network entities and select authoritative nodes. NERD records network entity profiles based on various sources, i.e., Warden, Blacklists, DShield, AlienVault Open Threat Exchange (OTX), and MISP (Malware Information Sharing Platform). It summarizes these profile records into… More >

  • Open Access

    ARTICLE

    Application of the Deep Convolutional Neural Network for the Classification of Auto Immune Diseases

    Fayaz Muhammad1, Jahangir Khan1, Asad Ullah1, Fasee Ullah1, Razaullah Khan2, Inayat Khan2, Mohammed ElAffendi3, Gauhar Ali3,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 647-664, 2023, DOI:10.32604/cmc.2023.038748

    Abstract IIF (Indirect Immune Florescence) has gained much attention recently due to its importance in medical sciences. The primary purpose of this work is to highlight a step-by-step methodology for detecting autoimmune diseases. The use of IIF for detecting autoimmune diseases is widespread in different medical areas. Nearly 80 different types of autoimmune diseases have existed in various body parts. The IIF has been used for image classification in both ways, manually and by using the Computer-Aided Detection (CAD) system. The data scientists conducted various research works using an automatic CAD system with low accuracy. The diseases in the human body… More >

  • Open Access

    ARTICLE

    The Effect of Organ Temperature on Total Yield of Transplanted and Direct-Seeded Rice (Oryza sativa L.)

    Ziwei Li1,2, Lifen Huang1,2, Zhongyang Huo1,2, Min Jiang1,2,*

    Phyton-International Journal of Experimental Botany, Vol.92, No.11, pp. 2999-3019, 2023, DOI:10.32604/phyton.2023.030627

    Abstract The canopy temperature of rice is an important index that directly reflects the growth and physiological state of rice, and affects the yield of rice plants to a great extent. The correlation between the temperatures of different rice organs and canopy in different growth stages and the grain yield is complex. The stability and universality of these correlations must be verified. We conducted a pot experiment using two rice varieties and two temperature treatments (high temperature treatment was carried out at the beginning of heading stage for 10 days). We measured rice organ temperature during seven stages of growth using… More >

  • Open Access

    ARTICLE

    Text Augmentation-Based Model for Emotion Recognition Using Transformers

    Fida Mohammad1,*, Mukhtaj Khan1, Safdar Nawaz Khan Marwat2, Naveed Jan3, Neelam Gohar4, Muhammad Bilal3, Amal Al-Rasheed5

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3523-3547, 2023, DOI:10.32604/cmc.2023.040202

    Abstract Emotion Recognition in Conversations (ERC) is fundamental in creating emotionally intelligent machines. Graph-Based Network (GBN) models have gained popularity in detecting conversational contexts for ERC tasks. However, their limited ability to collect and acquire contextual information hinders their effectiveness. We propose a Text Augmentation-based computational model for recognizing emotions using transformers (TA-MERT) to address this. The proposed model uses the Multimodal Emotion Lines Dataset (MELD), which ensures a balanced representation for recognizing human emotions. The model used text augmentation techniques to produce more training data, improving the proposed model’s accuracy. Transformer encoders train the deep neural network (DNN) model, especially… More >

  • Open Access

    ARTICLE

    Injections Attacks Efficient and Secure Techniques Based on Bidirectional Long Short Time Memory Model

    Abdulgbar A. R. Farea1, Gehad Abdullah Amran2,*, Ebraheem Farea3, Amerah Alabrah4,*, Ahmed A. Abdulraheem5, Muhammad Mursil6, Mohammed A. A. Al-qaness7

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3605-3622, 2023, DOI:10.32604/cmc.2023.040121

    Abstract E-commerce, online ticketing, online banking, and other web-based applications that handle sensitive data, such as passwords, payment information, and financial information, are widely used. Various web developers may have varying levels of understanding when it comes to securing an online application. Structured Query language SQL injection and cross-site scripting are the two vulnerabilities defined by the Open Web Application Security Project (OWASP) for its 2017 Top Ten List Cross Site Scripting (XSS). An attacker can exploit these two flaws and launch malicious web-based actions as a result of these flaws. Many published articles focused on these attacks’ binary classification. This… More >

Displaying 21-30 on page 3 of 327. Per Page