Numerical Solution of Boundary Layer Flow of Viscous Fluid Via Successive Linearization Method(CTCSA)-Lupine Publishers
The aim of this work is to obtain the numerical solutions for the boundary layer flow of heat transfer of incompressible viscous fluid. The governing partial differential equations are converted into ordinary differential equation by using a similarity transformation. The nonlinear equation governing the flow problem is modeled and then solved numerically by means of a successive linearization method (SLM). The numerical results are derived in tables for comparisons. The important result of this comparison is to show the high precision of the SLM in solving system of nonlinear differential equations. Graphical outcomes of various parameters such as Prandtl number (Pr) and Eckert number (Ec) on the flow, field are discussed and analyzed.
For more Lupine Publishers Open Access Journals Please visit our website: www.lupinepublishers.com/
For more Computer Science Article Please click here: https://lupinepublishers.com/computer-science-journal/index.php
|
Friday, 28 June 2019
Numerical Solution of Boundary Layer Flow of Viscous Fluid Via Successive Linearization Method(CTCSA)- Lupine Publishers
Friday, 21 June 2019
Mitigating Disaster using Secure Threshold-Cloud Architecture(CTCSA)- Lupine Publishers
Mitigating Disaster using Secure Threshold-Cloud Architecture(CTCSA)-Lupinepublishers |
https://lupinepublishers.com/computer-science-journal/fulltext/mitigating-disaster-using-secure-threshold-cloud-architecture.ID.000107.php
For more Lupine Publishers Open Access Journals Please visit our website: www.lupinepublishers.com/
For more Computer Science Journals Please click here: https://lupinepublishers.com/computer-science-journal/index.php
Tuesday, 18 June 2019
An Image Secret Sharing Method Based on Shamir Secret Sharing(CTCSA)-Lupinepublishers
An Image Secret Sharing Method Based on Shamir Secret Sharing by Selda Calkavur(CTCSA)-Lupinepublishers |
The effective and secure protection for important message is a primary concern in commercial and military applications. Numerous techniques, such as image hiding and watermarking, were developed to increase the security of the secret. The secret image sharing approaches are useful for protecting sensitive information [1]. The main idea of secret sharing is to transform an image into n shadow images that are transmitted and stored separately. The original image can be reconstructed only if the shadow images that participated in the revealing process from a qualified set [2]. The (k; n)-threshold image sharing schemes were developed to avoid the single point failure. Hence the encoded content is corrupted during transmission. In these schemes, the original image can be revealed if k or more of these n shadow images are obtained. Moreover, the users who with complete knowledge of k 1 shares cannot obtain the original image.
For more Lupine Publishers Open Access Journals Please visit our website: www.lupinepublishers.com/
For more Computer Science Articles Please click here: https://lupinepublishers.com/computer-science-journal/index.php
Monday, 10 June 2019
Lupine Publishers: Combined Digital and Traditional Bite Registration...
Lupine Publishers: Combined Digital and Traditional Bite Registration...: Combined Digital and Traditional Bite Registration by Sadek Bakdach in MADOHC - Lupine Publishers A high percentage of dental restora...
Monday, 3 June 2019
Lupine Publishers: List Of Open Access Journals in Lupine Publishers
Lupine Publishers: List Of Open Access Journals in Lupine Publishers: agriculture open access journals Add caption Journal of Chemical Sciences Open Access Dental Journals Civil Engineerin...
Subscribe to:
Posts (Atom)
Wishing you a Magical and Blissful Holiday
Take a leap of faith and begin this wondrous new year by believing. Happy New Year!
-
Mini View on Current Trends in Computer Sciences & Applications by Ajay Rana in Current Trends in Computer Sciences& Applic...
-
Lupine Publishers | Current Trends in Computer Sciences & Applications Abstract There are many risks in moving data into p...
-
Internet of Things and Privacy by Christos Beretas in Current Trends in Computer Sciences & Applications in Lupinepublishers T...