Two published theoretical models are examined and applied to experimental results for absorption and desorption. The system used was CO2/H2O and studies were made for liquid film flow down inclined planes. Experimental results give “Reduced” values of mass ransfer rates.
Interferometric studies give interfacial concentration, penetration and film depths, and take-up of carbon dioxide. In the case of desorption the interferograms are distorted by “deflections.”
All the experimental values for absorption and desorption differ from those calculated from theoretical models.
Desorption is not a mirror image of absorption, and it is approximately 75% of the transfer rate of absorption over a wide operating range.
A comparison is made of the behaviour of static pools and flowing liquid films. 相似文献
With the increasing number of electricity consumers, production, distribution, and consumption problems of produced energy have appeared. This paper proposed an optimization method to reduce the peak demand using smart grid capabilities. In the proposed method, a hybrid Grasshopper Optimization Algorithm (GOA) with the self-adaptive Differential Evolution (DE) is used, called HGOA. The proposed method takes advantage of the global and local search strategies from Differential Evolution and Grasshopper Optimization Algorithm. Experimental results are applied in two scenarios; the first scenario has universal inputs and several appliances. The second scenario has an expanded number of appliances. The results showed that the proposed method (HGOA) got better power scheduling arrangements and better performance than other comparative algorithms using the classical benchmark functions. Moreover, according to the computational time, it runs in constant execution time as the population is increased. The proposed method got 0.26?% enhancement compared to the other methods. Finally, we found that the proposed HGOA always got better results than the original method in the worst cases and the best cases.
Multimedia Tools and Applications - Automated segmentation has an essential role in detecting several diseases, such as skin lesions. In segmentation, the active contour (AC) is an efficient method... 相似文献
Impurities from the raw materials, the grinding and the homogenization of the raw materials, the kiln instability and the complexity of the cooling step, all these factors make it difficult to obtain a perfect evaluation of the mineralogical composition of Portland clinker. We studied the limitations of the most commonly used quantitative methods and recommend some procedures to obtain reliable and reproducible results of quantitative analyses. Different clinker samples (provided by the Bizerte Cement Company (Tunisia)) were subjected to an elemental analysis by X-ray fluorescence and the mineralogical composition was determined by the Bogue calculation and by X-ray powder diffraction combined with the Rietveld method (Different softwares were used: XPert High Score Plus version 2.0 and TOPAS version 4.2). We then compared the results obtained by the Rietveld method and the Bogue calculation to the specific peak areas of each phase. The content of each phase, determined by the Rietveld method, varied proportionally to the change in peak area; a significant difference in these results was found by using the elementary Bogue calculation. 相似文献
This study focuses on the behavior of a cylindrical metal halide discharge lamp powered by frequency‐controlled electronic ballast. Half‐bridge electronic ballast was designed and achieved. 相似文献
This paper proposes a color image encryption scheme using one-time keys based on crossover operator, chaos and the Secure Hash Algorithm(SHA-2). The (SHA-2) is employed to generate a 256-bit hash value from both the plain-image and the secret hash keys to make the key stream change in each encryption process. The SHA-2 value is employed to generate three initial values of the chaotic system. The permutation-diffusion process is based on the crossover operator and XOR operator, respectively. Experimental results and security analysis show that the scheme can achieve good encryption result through only one round encryption process, the key space is large enough to resist against common attacks,so the scheme is reliable to be applied in image encryption and secure communication. 相似文献