Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    REVIEW

    HYDRODYNAMIC AND THERMAL PERFORMANCE OF TWISTED TAPE INSERT PROVIDED IN HEAT EXCHANGER TUBES: A REVIEW

    Ravi Datta,b , Anil Kumarc,*, Mangal Singh Bhistd , Alok Darshan Kothiyale , Rajesh Maithanif

    Frontiers in Heat and Mass Transfer, Vol.12, pp. 1-19, 2019, DOI:10.5098/hmt.12.26

    Abstract This work presents a review of the research recent results concerning the augmentation of hydrodynamic and thermal performance of various twisted tape inserts in heat exchanger tubes. The thermal and hydrodynamic correlations for various twisted tape elements have been summarized. A comparative study of thermal and hydrodynamic performance of numerous twisted elements has also been reported to understand the result of applications of twisted tape inserts in heat exchanger tubes. The literature review found that multiple twisted tapes heat exchanger tube shape enhanced hydrodynamic and thermal performance than other comparable twisted tape inserts heat exchanger tube shapes. The review of… More >

  • Open Access

    ARTICLE

    A Survey on Digital Image Copy-Move Forgery Localization Using Passive Techniques

    Weijin Tan1,*, Yunqing Wu1, Peng Wu1, Beijing Chen1,2

    Journal of New Media, Vol.1, No.1, pp. 11-25, 2019, DOI:10.32604/jnm.2019.06219

    Abstract Digital images can be tampered easily with simple image editing software tools. Therefore, image forensic investigation on the authenticity of digital images’ content is increasingly important. Copy-move is one of the most common types of image forgeries. Thus, an overview of the traditional and the recent copy-move forgery localization methods using passive techniques is presented in this paper. These methods are classified into three types: block-based methods, keypoint-based methods, and deep learning-based methods. In addition, the strengths and weaknesses of these methods are compared and analyzed in robustness and computational cost. Finally, further research directions are discussed. More >

Displaying 1-10 on page 1 of 2. Per Page