Author of the publication

Turbulent Accelerating Combusting Flows with Methane-Vitiated Air Flamelet Model

, , , , and . AIAA journal, 63 (4): 1474-1489 (2024)
DOI: 10.2514/1.J064259

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Annotating mobile phone location data with activity purposes using machine learning algorithms., , , and . Expert Syst. Appl., 40 (8): 3299-3311 (2013)Free-space nano-optical devices and integration: Design, fabrication, and manufacturing., , , , , , , , and . Bell Labs Technical Journal, 10 (3): 107-127 (2005)2D Barcodes for visual cryptography., , and . Multimedia Tools Appl., 75 (2): 1223-1241 (2016)Self-calibrating Coil Sensitivity Profiles for Parallel Imaging Based on Anisotropic Diffusion., , , and . Journal of Multimedia, 5 (6): 580-587 (2010)FDTD Investigations into UWB Radar Technique of Breast Tumor Detection and Location., , , and . African J. of Inf. & Commun. Technology, (2006)An optimal weather condition dependent approach for emission planning in urban areas., , , and . Environmental Modelling and Software, 22 (4): 548-557 (2007)Quantitative QoS Management Implement Mechanism in IP-DiffServ., , , and . J. Comput. Sci. Technol., 20 (6): 831-835 (2005)CRP-CMAC: A Priority-Differentiated Cooperative MAC Protocol with Contention Resolution for Multihop Wireless Networks., , and . TIIS, 7 (11): 2636-2656 (2013)Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications, and . Springer, (2014)Using Simulation to Characterize Topology of Peer to Peer Botnets., , , , and . ICCMS, page 78-83. IEEE Computer Society, (2009)