A numerical investigation is adopted for two dimensional thermal analysis of rocket thrust chamber wall (RL10), employing finite difference model with iterative scheme (implemented under relaxation factor of 0.9 for convergence) to compute temperature distribution within thrust chamber wall (which is composed of Nickel and Copper layers). The analysis is conducted for different boundary conditions: only convection boundary conditions then combined radiation, convection boundary conditions also for different aspect ratio (AR) of cooling channel. The results show that Utilizing cooling channels of high aspect ratio leads to decrease in temperature variation across thrust chamber wall, while no effects on heat transferred to the
... Show MoreFree boundary problems with nonlinear diffusion occur in various applications, such as solidification over a mould with dissimilar nonlinear thermal properties and saturated or unsaturated absorption in the soil beneath a pond. In this article, we consider a novel inverse problem where a free boundary is determined from the mass/energy specification in a well-posed one-dimensional nonlinear diffusion problem, and a stability estimate is established. The problem is recast as a nonlinear least-squares minimisation problem, which is solved numerically using the
In this paper the research introduces a new definition of a fuzzy normed space then the related concepts such as fuzzy continuous, convergence of sequence of fuzzy points and Cauchy sequence of fuzzy points are discussed in details.
Fuzzy orbit topological space is a new structure very recently given by [1]. This new space is based on the notion of open fuzzy orbit sets. The aim of this paper is to provide applications of open fuzzy orbit sets. We introduce the notions of fuzzy orbit irresolute mappings and fuzzy orbit open (resp. irresolute open) mappings and studied some of their properties. .
Within that research, we introduce fibrewise fuzzy types of the most important separation axioms in ordinary fuzz topology, namely fibrewise fuzzy (T 0 spaces, T 1 spaces, R 0 spaces, Hausdorff spaces, functionally Hausdorff spaces, regular spaces, completely regular spaces, normal spaces, and normal spaces). Too we add numerous outcomes about it.
The concept of fuzzy orbit open sets under the mapping
This paper introduce two types of edge degrees (line degree and near line degree) and total edge degrees (total line degree and total near line degree) of an edge in a fuzzy semigraph, where a fuzzy semigraph is defined as (V, σ, μ, η) defined on a semigraph G* in which σ : V → [0, 1], μ : VxV → [0, 1] and η : X → [0, 1] satisfy the conditions that for all the vertices u, v in the vertex set, μ(u, v) ≤ σ(u) ᴧ σ(v) and η(e) = μ(u1, u2) ᴧ μ(u2, u3) ᴧ … ᴧ μ(un-1, un) ≤ σ(u1) ᴧ σ(un), if e = (u1, u2, …, un), n ≥ 2 is an edge in the semigraph G
... Show MoreThis research is concerned with the re-analysis of optical data (the imaginary part of the dielectric function as a function of photon energy E) of a-Si:H films prepared by Jackson et al. and Ferlauto et al. through using nonlinear regression fitting we estimated the optical energy gap and the deviation from the Tauc model by considering the parameter of energy photon-dependence of the momentum matrix element of the p as a free parameter by assuming that density of states distribution to be a square root function. It is observed for films prepared by Jackson et al. that the value of the parameter p for the photon energy range is is close to the value assumed by the Cody model and the optical gap energy is which is also close to the value
... Show MoreIn Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show More