نتایج جستجو برای: entropy generation and bejan number

تعداد نتایج: 16938034  

Journal: :Mathematical Problems in Engineering 2022

This analysis examines the flow of Sutterby nanofluid having bioconvection due to a stretching sheet and heated convective boundary condition. The heat sink/source was imposed in terms energy equation. entropy minimization is also considered. Through appropriate transformation system nonlinear PDE’s setting, existing problem has altered into ODEs then numerically utilized via bvp4c method. nume...

2017
Mohsen Torabi

This work aims to provide a comprehensive study on the heat transfer and entropy generation rates of a horizontal channel partially filled with a porous medium which experiences internal heat generation or consumption due to exothermic or endothermic chemical reaction. The focus has been given to the local thermal nonequilibrium (LTNE) model. The LTNE approach helps us to deliver more accurate ...

2005
Eiyad Abu-Nada

The present research investigates second law analysis of laminar flow over a backward facing step (BFS). Entropy generation due to separation, reattachment, recirculation and heat transfer is studied numerically. Local entropy generation distributions were obtained by solving momentum, energy, and entropy generation equations. The effect of dimensionless temperature difference number (τ) and Br...

ژورنال: اقتصاد مقداری 2015

An economic system is comprised of different primary flows that can be captured in macroeconomic models with complex network relations. Theoretically and empirically in this system, weak substitution or complementarity of environmental materials, like energy and other production factors such as capital, is undeniable. This is an effective critique on neoclassical economics. In this paper, we vi...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم انسانی 1389

there are two major theories of measurement in psychometrics: classical test theory (ctt) and item-response theory (irt). despite its widespread and long use, ctt has a number of shortcomings, which make it problematic to be used for practical and theoretical purposes. irt tries to solve these shortcomings, and provide better and more dependable answers. one of the applications of irt is the as...

The necessity for decrease in consumption of conventional fuel, related energy and to promote the use of renewable sources such as biofuels, demands for the effective evaluation of the performance of engines based on laws of thermodynamics. Energy, exergy, entropy generation, mean gas temperature and exhaust gas temperature analysis of CI engine using diesel and karanja methyl ester blends at d...

پایان نامه :0 1375

to explore the idea the investingation proposed, aimed at finding whether the performances of the population of iranians students studying english in an efl context are consistent in l1 and l2 writing taks and whether there is a cross-linguistic transfer in this respect. in this regard the subjects were instructed to write four compositions-two in english and two in farsi-which consisted of an ...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1391

abstract: proverbs are of the language materials which of the food of any language depends on the quality and quantity of these same materials. in the present research, the researcher tried to present the ramsarian proverbs according to four variables of color, fruit, plantsand animals that selected from the book of the members of each of these four variables, put them into the spss system fo...

Journal: :CoRR 2009
Masahito Hayashi

We derive a new upper bound for Eve’s information in secret key generation from a common random number without communication. This bound improves on Bennett[7]’s bound based on the Rényi entropy of order 2 because the bound obtained here uses the Rényi entropy of order 1+s for s ∈ [0, 1]. This bound is applied to a wire-tap channel. Then, we derive an exponential upper bound for Eve’s informati...

Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید