Browse Items (3575 total)

The problem of steady two-dimensional boundary layer flow of momentum, heat and mass transfer over a stretching permeable wedge-shaped surface in a nanofluid in presence of magnetic field has been studied. In this respect, the governing partial…

Due to the increase of maritime transportation volume day by day it is necessary to design a ship hull having large carrying capacity with low resistance. In case of slow moving ships, usually wave breaking occurs in front of bow. A considerable…

The purpose of this study is to examine the use of e-Numeracy: Mobile Application of the Numeracy Understanding Model among primary school students. Through e-Numeration, it allows students to solve numerical problems in their respective smart…

The rapid advancement of mobile computing technology and the rising usage of mobile apps made our daily life more productive. The mobile app should operate all the time bug-free in order to improve user satisfaction and offers great business value to…

The points of separation of magneto-hydrodynamic mixed convection boundary layer flow along a vertical plate have been investigated. The free stream velocity is considered decreasing exponentially in the stream wise direction. The governing boundary…

 In this work simulation of a turbulent H2/N2 jet diffusion flame with flamelet modelling has been presented. The favre-averaged mixture fraction has been employed to model the combustion. Favre-averaged scalar quantities have been calculated from…

The effects of internal heat generation on natural convection flow with temperature dependent variable viscosity along a uniformly heated vertical wavy surface have been investigated. The governing boundary layer equations are first transformed into…

Nowadays, individuals and organizations areincreasinglytargeted by phishing attacks,soan accurate phishing detectionsystemisrequired. Therefore, many phishing detection techniques have been proposed as well as phishing datasets have been collected.…

Currently, cloud computing is facing different types of threats whether from inside or outside its environment.  This may cause cloud to be crashed or at least unable to provide services to the requests made by clients. In this paper, a new technique…

One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messaging between two sides without detection. In this paper, an…
Output Formats

atom, dcmes-xml, json, omeka-xml, podcast, rss2