Search
Now showing items 1471-1480 of 1527
A Robust Modification to the Universal Cavitation Algorithm in Journal Bearings
(
American Society of Mechanical Engineers
, 2016 , Article)
In the current study, a modified fast converging, mass-conserving, and robust algorithm is proposed for calculation of the pressure distribution of a cavitated axially grooved journal bearing based on the finite volume ...
Aeroacoustic Simulation for NASA CC3 Centrifugal Compressor Operating at off Design Condition
(2016 , Conference Paper)
This paper covers the characterization of the acoustic noise and the unsteady flow field of a high speed centrifugal compressor NASA CC3. In order to accurately predict the noise, all analyses are carried out through the ...
المنافسة غير المشروعة في ضوء القانون القطري
(
كلية القانون الكويتية العالمية
, 2016 , Article)
يتناول هذا البحث دراسة القواعد القانونية الناظمة للمنافسة غير المشروعة في ضوء المواد من68 إلى73 من قانون التجارة القطري27 لسنة 2006 وغيرها من المواد التي يتضمنها أي قانون قطري آخرذات صلة بموضوع الدراسة من أجل الوقوف على ...
Light-weight, Conservative, yet Effective: Scalable Real-time Tweet Summarization
(
National Institute of Standards and Technology (NIST)
, 2016 , Conference Paper)
Microblogging platforms and Twitter specifically have become a major resource for exploring diverse topics of interest that vary from the world's breaking news to other topics such as sports, science, religion and even ...
Service Chaining for NFV and Delivery of Other Applications in a Global Multi-cloud Environment
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Network Function Virtualization (NFV) allows Internet Service Providers (ISPs) to implement key function modules, such as, BRAS (Broadband Remote Access Server), IMS (Internet Multimedia System), etc. in virtual machines ...
Garbled computation in cloud
(
Elsevier
, 2016 , Article)
With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
Guidelines for design and implementation of mobile learning
(
IGI Global
, 2016 , Book chapter)
As technology evolves, there is a shift towards the use of mobile technology to deliver education both on-campus in a blended format and online delivery. This shift is moving at a very fast pace which is a major challenge ...
An integrative psychological model for radicalism : Evidence from structural equation modeling
(
Elsevier Ltd
, 2016 , Article)
The present study aimed at testing an integrative model that comprises cognitive, psychopathological and psychosocial factors that potentially relate to radicalism as an antecedent condition to radical and terrorist ...
Indicators for spatial–temporal comparisons of ecosystem service status between regions: A case study of the Taihu River Basin, China
(
Elsevier Ltd
, 2016 , Article)
With the development of ecological science, the demand to integrate ecosystem services into ecological management is increasing. Stakeholders are interested in comparing stocks and ability to supply ecosystem services in ...
Computational study on oxynitride perovskites for CO2 photoreduction
(
Elsevier Ltd
, 2016 , Article)
The photocatalytic conversion of CO2 into chemical fuels is an attractive route for recycling this greenhouse gas. However, the large scale application of such approach is limited by the low selectivity and activity of the ...