Search
Now showing items 261-270 of 296
Numerical simulation of stall development into surge and stall control using air injection in centrifugal compressors
(
American Society of Mechanical Engineers (ASME)
, 2014 , Conference Paper)
This study presents a numerical simulation of the formation of rotating stall and the initiation of surge in order to study the connection between stall and surge in centrifugal compressors. Also, the current paper introduces ...
Numerical investigation of steady air injection flow to control rotating stall in centrifugal compressors
(
Web Portal ASME (American Society of Mechanical Engineers)
, 2014 , Conference Paper)
This paper concerns the role of air injection method in stabilization and stall control in centrifugal compressors. The main aim is to find the best arrangement of air injection parameters such as injection angle and ...
Unsteady CFD simulation for high speed centrifugal compressor operating near surge
(
American Society of Mechanical Engineers (ASME)
, 2014 , Conference Paper)
Centrifugal compressor surge and stall are an instabilities flow and system phenomenon, which can lead to a loss of engine power, large pressure transients and, in some cases, failure of the compressor and bearing system. ...
Tensile, hardness, and torsion behavior of welded AA
(
Trans Tech Publications Ltd
, 2014 , Conference Paper)
Tensile, Torsion, and Hardness behavior of welded and un-welded Aluminium Alloy 6061 T6 were investigated. Tests were conducted to evaluate the impact of tungsten Gas Arc welding (TIG) on some of the mechanical properties ...
Boundary optimal control of coupled parabolic PDE-ODE systems
(
IFAC Secretariat
, 2014 , Conference Paper)
This paper deals with boundary optimal control problem for coupled parabolic PDEODE systems. The problem is studied using infinite-dimensional state space representation of the coupled PDE-ODE system. Linearization of the ...
Image steganography based on LSBMR using Sobel edge detection
(
IEEE
, 2014 , Conference Paper)
Steganography is the science of embedding confidential data inside data so they can be sent to destination without suspicion. Image-steganography is the most popular type of carrier to hold information. Many algorithms ...
A pictorial mobile-based communication application for non-verbal people with autism
(
IEEE
, 2014 , Conference Paper)
Non-verbal people with autism are usually unable to communicate normally using natural languages. They can, however, learn to communicate through specific symbols and images. Special education instructors have adopted this ...
A new WDM Application Response Time in WLAN Network and Fixed WiMAX using Distributed
(
IEEE
, 2014 , Conference Paper)
Worldwide Interoperability for Microwave Access (WiMAX) and Wireless LAN (WLAN) has emerged as a promising solution for last mile access technology to provide high speed internet access in the residential as well as small ...
Clustered binary consensus in sensor motes
(
VDE VERLAG GMBH
, 2014 , Conference Paper)
In this work, we extend and adapt the binary consensus algorithm to operate using clusters in a wireless sensor network. Binary consensus is a decision making algorithm used to cause distributed entities to agree on the ...
A new WDM Application Response Time in WLAN Network and Fixed WiMAX using Distributed
(
IEEE Computer Society
, 2014 , Conference Paper)
Worldwide Interoperability for Microwave Access (WiMAX) and Wireless LAN (WLAN) has emerged as a promising solution for last mile access technology to provide high speed internet access in the residential as well as small ...