Search results for: co-prime numbers
1191 Application of Golden Ratio in Contemporary Textile Industry and Its Effect on Consumer Preferences
Authors: Rafia Asghar, Abdul Hafeez
Abstract:
This research aims to determine the influence of Fibonacci numbers and golden ratio through textile designs. This study was carried out by collecting a variety of designs from different textile industries. Top textile designers were also interviewed regarding golden ratio and its application on their designs and design execution process. This study revealed that most of the designs fulfilled the golden ratio and the designs that were according to golden ratio were more favorite to the consumers.Keywords: golden ratio, Fibonacci numbers, textile design, designs
Procedia PDF Downloads 7171190 Numerical Simulation of Unsteady Cases of Fluid Flow Using Modified Dynamic Boundary Condition (mDBC) in Smoothed Particle Hydrodynamics Models
Authors: Exa Heydemans, Jessica Sjah, Dwinanti Rika Marthanty
Abstract:
This paper presents numerical simulations using an open boundary algorithm with modified dynamic boundary condition (mDBC) for weakly compressible smoothed particle hydrodynamics models from particle-based code Dualsphysics. The problems of piping erosion in dams and dikes are aimed for studying the algorithm. The case 2D model of unsteady fluid flow past around a fixed cylinder is simulated, where various values of Reynold’s numbers (Re40, Re60, Re80, and Re100) and different model’s resolution are considered. A constant velocity with different values of viscosity for generating various Reynold’s numbers and different numbers of particles over a cylinder for the resolution are modeled. The interaction between solid particles of the cylinder and fluid particles is concerned. The cylinder is affected by the hydrodynamics force caused by the flow of fluid particles. The solid particles of the cylinder are the observation points to obtain force and pressure due to the hydrodynamics forces. As results of the simulation, which is to show the capability to model 2D unsteady with various Reynold’s numbers, the pressure coefficient, drag coefficient, lift coefficient, and Strouhal number are compared to the previous work from literature.Keywords: hydrodynamics, internal erosion, dualsphysics, viscous fluid flow
Procedia PDF Downloads 1631189 Performance Study of Scraped Surface Heat Exchanger with Helical Ribbons
Abstract:
In this work, numerical simulations were carried out using a specific CFD code in order to study the performance of an innovative Scraped Surface Heat Exchanger (SSHE) with helical ribbons for Bingham fluids (threshold fluids). The resolution of three-dimensional form of the conservation equations (continuity, momentum and energy equations) was carried out basing on the finite volume method (FVM). After studying the effect of dimensionless numbers (axial Reynolds, rotational Reynolds and Oldroyd numbers) on the hydrodynamic and thermal behaviors within SSHE, a parametric study was developed, by varying the width of the helical ribbon, the clearance between the stator wall and the tip of the ribbon and the number of turns of the helical ribbon, in order to improve the heat transfer inside the exchanger. The effect of these geometrical numbers on the hydrodynamic and thermal behaviors was discussed.Keywords: heat transfer, helical ribbons, hydrodynamic behavior, parametric study, SSHE, thermal behavior
Procedia PDF Downloads 2121188 Closed Forms of Trigonometric Series Interms of Riemann’s ζ Function and Dirichlet η, λ, β Functions or the Hurwitz Zeta Function and Harmonic Numbers
Authors: Slobodan B. Tričković
Abstract:
We present the results concerned with trigonometric series that include sine and cosine functions with a parameter appearing in the denominator. We derive two types of closed-form formulas for trigonometric series. At first, for some integer values, as we know that Riemann’s ζ function and Dirichlet η, λ equal zero at negative even integers, whereas Dirichlet’s β function equals zero at negative odd integers, after a certain number of members, the rest of the series vanishes. Thus, a trigonometric series becomes a polynomial with coefficients involving Riemann’s ζ function and Dirichlet η, λ, β functions. On the other hand, in some cases, one cannot immediately replace the parameter with any positive integer because we shall encounter singularities. So it is necessary to take a limit, so in the process, we apply L’Hospital’s rule and, after a series of rearrangements, we bring a trigonometric series to a form suitable for the application of Choi-Srivastava’s theorem dealing with Hurwitz’s zeta function and Harmonic numbers. In this way, we express a trigonometric series as a polynomial over Hurwitz’s zeta function derivative.Keywords: Dirichlet eta lambda beta functions, Riemann's zeta function, Hurwitz zeta function, Harmonic numbers
Procedia PDF Downloads 1021187 The Different Improvement of Numerical Magnitude and Spatial Representation of Numbers to Symbolic Approximate Arithmetic: A Training Study of Preschooler
Abstract:
Spatial representation of numbers and numerical magnitude are important for preschoolers’ mathematical ability. Mental number line, a typical index to measure numbers spatial representation, and numerical comparison are both related to arithmetic obviously. However, they seem to rely on different mechanisms and probably influence arithmetic through different mechanisms. In line with this idea, preschool children were trained with two tasks to investigate which one is more important for approximate arithmetic. The training of numerical processing and number line estimation were proved to be effective. They both improved the ability of approximate arithmetic. When the difficulty of approximate arithmetic was taken into account, the performance in number line training group was not significantly different among three levels. However, two harder levels achieved significance in numerical comparison training group. Thus, comparing spatial representation ability, symbolic approximation arithmetic relies more on numerical magnitude. Educational implications of the study were discussed.Keywords: approximate arithmetic, mental number line, numerical magnitude, preschooler
Procedia PDF Downloads 2501186 Development and Comparative Analysis of a New C-H Split and Recombine Micromixer
Authors: Vladimir Viktorov, Readul Mahmud, Carmen Visconte
Abstract:
In the present study, a new passive micromixer based on SAR principle, combining the operation concepts of known Chain and H mixers, called C-H micromixer, is developed and studied. The efficiency and the pressure drop of the C-H mixer along with two known SAR passive mixers named Chain and Tear-drop were investigated numerically at Reynolds numbers up to 100, taking into account species transport. At the same time experimental tests of the Chain and Tear-drop mixers were carried out at low Reynolds number, in the 0.1≤Re≤4.2 range. Numerical and experimental results coincide considerably, which validate the numerical simulation approach. Results show that mixing efficiency of the Tear-drop mixer is good except at the middle range of Reynolds number but pressure drop is too high; conversely the Chain mixer has moderate pressure drop but relatively low mixing efficiency at low and middle Re numbers. Whereas, the C-H mixer gives excellent mixing efficiency at all range of Re numbers. In addition, the C-H mixer shows respectively about 3 and 2 times lower pressure drop than the Tear-drop mixer and the Chain mixer.Keywords: CFD, micromixing, passive micromixer, SAR
Procedia PDF Downloads 3061185 A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables
Authors: M. Hamdi, R. Rhouma, S. Belghith
Abstract:
Generating random numbers are mainly used to create secret keys or random sequences. It can be carried out by various techniques. In this paper we present a very simple and efficient pseudo-random number generator (PRNG) based on chaotic maps and S-Box tables. This technique adopted two main operations one to generate chaotic values using two logistic maps and the second to transform them into binary words using random S-Box tables. The simulation analysis indicates that our PRNG possessing excellent statistical and cryptographic properties.Keywords: Random Numbers, Chaotic map, S-box, cryptography, statistical tests
Procedia PDF Downloads 3651184 Heat and Mass Transfer of Triple Diffusive Convection in a Rotating Couple Stress Liquid Using Ginzburg-Landau Model
Authors: Sameena Tarannum, S. Pranesh
Abstract:
A nonlinear study of triple diffusive convection in a rotating couple stress liquid has been analysed. It is performed to study the effect of heat and mass transfer by deriving Ginzburg-Landau equation. Heat and mass transfer are quantified in terms of Nusselt number and Sherwood numbers, which are obtained as a function of thermal and solute Rayleigh numbers. The obtained Ginzburg-Landau equation is Bernoulli equation, and it has been elucidated numerically by using Mathematica. The effects of couple stress parameter, solute Rayleigh numbers, and Taylor number on the onset of convection and heat and mass transfer have been examined. It is found that the effects of couple stress parameter and Taylor number are to stabilize the system and to increase the heat and mass transfer.Keywords: couple stress liquid, Ginzburg-Landau model, rotation, triple diffusive convection
Procedia PDF Downloads 3361183 Dynamical Systems and Fibonacci Numbers
Authors: Vandana N. Purav
Abstract:
The Dynamical systems concept is a mathematical formalization for any fixed rule that describes the time dependence of a points position in its ambient space. e.g. pendulum of a clock, the number of fish each spring in a lake, the number of rabbits spring in an enclosure, etc. The Dynamical system theory used to describe the complex nature that is dynamical systems with differential equations called continuous dynamical system or dynamical system with difference equations called discrete dynamical system. The concept of dynamical system has its origin in Newtonian mechanics.Keywords: dynamical systems, Fibonacci numbers, Newtonian mechanics, discrete dynamical system
Procedia PDF Downloads 4911182 An Analysis of Non-Elliptic Curve Based Primality Tests
Authors: William Wong, Zakaria Alomari, Hon Ching Lai, Zhida Li
Abstract:
Modern-day information security depends on implementing Diffie-Hellman, which requires the generation of prime numbers. Because the number of primes is infinite, it is impractical to store prime numbers for use, and therefore, primality tests are indispensable in modern-day information security. A primality test is a test to determine whether a number is prime or composite. There are two types of primality tests, which are deterministic tests and probabilistic tests. Deterministic tests are adopting algorithms that provide a definite answer whether a given number is prime or composite. While in probabilistic tests, a probabilistic result would be provided, there is a degree of uncertainty. In this paper, we review three probabilistic tests: the Fermat Primality Test, the Miller-Rabin Test, and the Baillie-PSW Test, as well as one deterministic test, the Agrawal-Kayal-Saxena (AKS) Test. Furthermore, we do an analysis of these tests. All of the reviews discussed are not based on the Elliptic Curve. The analysis demonstrates that, in the majority of real-world scenarios, the Baillie- PSW test’s favorability stems from its typical operational complexity of O(log 3n) and its capacity to deliver accurate results for numbers below 2^64.Keywords: primality tests, Fermat’s primality test, Miller-Rabin primality test, Baillie-PSW primality test, AKS primality test
Procedia PDF Downloads 871181 Resilient Security System with Toll Free Call Services: Case Study of Adama City
Authors: Shanko Chura Aredo, Hailu Jeldie Wodajo, Muktar Jeylan, Kedir Ilka, Abdulnasir Husein
Abstract:
Toll-free numbers are calling numbers that have unique three or four digit numbers and that don’t require payment from phone lines in order to be called. With the help of these numbers, callers can connect with nearby organizations and/or people without incurring far-reaching fees. Calls to assistance centers are especially popular from toll-free phones. In the past, toll-free services have offered prospective clients and other parties a simple and cost-free means of getting in touch with enterprises. Nevertheless, unless they have an ”unlimited calling” plan, wireless subscribers will be billed for the airtime minutes used during a toll-free call. In Adama, the second largest city in Ethiopia, a call center has been installed as part of smart security system and serving since January 2023 for collection of complaints from different community levels. The call center is situated at the mayor office and has 11 active workers, 4 of these working the night time and the remaining during day time. The information reported in the form of complaints from individuals and groups are illegal constructions, illegal trade, income concealment or hiding, giving and receiving bribe, informing new faces of suspected enemies and exposing individual or group conflicts. This technology has been found to bring a significant outcome in minimizing illegal acts, public safety threats and service delivery problems.Keywords: smart, safety, crime, call center, security
Procedia PDF Downloads 541180 Control Effect of Flowering Chrysanthemum, the Trap Plant to the Western Flower Thrips, Frankliniella occidentalis (Thysanoptera: Thripidae) in Greenhouse
Authors: YongSeok Choi, HwaYoung Seo, InSu Whang, GeogKee Park
Abstract:
Frankliniella. occidentalis is major pest in chrysanthemum in worldwide. The density of F. occidentalis increased continuously in spite of the periodical chemical control after planting in this study. F. occidentalis began to increase mid-May. The numbers of F. occidentalis collected on a tray with wet paper by heating the flowers of pink, white, and yellow Chrysanthemum standard mums were 18.4, 56.6, and 52.6 in the flowering season. Also, the numbers were 15.2, 45.8, and 41.6 in bud season, but in the case of the leaves, the numbers were 2, 8.8 and 3.4. In the Y-tube olfactometer test, the frequency of F. occidentalis’ visits to one side arm of the Y-tube olfactometer was higher in the odor cue of the white flower than of the yellow, red, and violet flowers, but the frequency was higher in the odor cue of the violet and red flowers than of the yellow without white. In the case of the four-choice olfactometer test, in the same visual cues as the odor cues of the pot mum flowers, the frequency of F. occidentalis was higher in the yellow flower than in the other flowers (white, red, and violet) in all the observation times (10, 15, and 20 minutes).Keywords: Frankliniella occidentalis, Chrysanthemum, trap plant, control effect
Procedia PDF Downloads 1871179 General Network with Four Nodes and Four Activities with Triangular Fuzzy Number as Activity Times
Authors: Rashmi Tamhankar, Madhav Bapat
Abstract:
In many projects, we have to use human judgment for determining the duration of the activities which may vary from person to person. Hence, there is vagueness about the time duration for activities in network planning. Fuzzy sets can handle such vague or imprecise concepts and has an application to such network. The vague activity times can be represented by triangular fuzzy numbers. In this paper, a general network with fuzzy activity times is considered and conditions for the critical path are obtained also we compute total float time of each activity. Several numerical examples are discussed.Keywords: PERT, CPM, triangular fuzzy numbers, fuzzy activity times
Procedia PDF Downloads 4721178 Conditions on Expressing a Matrix as a Sum of α-Involutions
Authors: Ric Joseph R. Murillo, Edna N. Gueco, Dennis I. Merino
Abstract:
Let F be C or R, where C and R are the set of complex numbers and real numbers, respectively, and n be a natural number. An n-by-n matrix A over the field F is called an α-involutory matrix or an α-involution if there exists an α in the field such that the square of the matrix is equal to αI, where I is the n-by-n identity matrix. If α is a complex number or a nonnegative real number, then an n-by-n matrix A over the field F can be written as a sum of n-by-n α-involutory matrices over the field F if and only if the trace of that matrix is an integral multiple of the square root of α. Meanwhile, if α is a negative real number, then a 2n-by-2n matrix A over R can be written as a sum of 2n-by-2n α-involutory matrices over R if and only the trace of the matrix is zero. Some other properties of α-involutory matrices are also determinedKeywords: α-involutory Matrices, sum of α-involutory Matrices, Trace, Matrix Theory
Procedia PDF Downloads 1971177 Effective Use of Visuals in Teaching Mathematics
Authors: Gohar Marikyan
Abstract:
This article is about investigating how to effectively use visuals in teaching introductory mathematics. The analysis showed the use of visuals in teaching introductory mathematics can be an effective tool for enhancing students’ learning and engagement in mathematics. The use of visuals was particularly effective for teaching concepts of numbers, operations with whole numbers, and properties of operations. The analysis also provides strong evidence that the effectiveness of visuals varied depending on the way the visuals are used. Furthermore, the analysis revealed that the use of visuals in mathematics instruction had a positive impact on student’s attitudes toward mathematics, with students showing higher levels of motivation and enjoyment in mathematics classes.Keywords: analytical thinking skills, instructional strategies with visuals, introductory mathematics, student engagement and motivation
Procedia PDF Downloads 1201176 Fractional Residue Number System
Authors: Parisa Khoshvaght, Mehdi Hosseinzadeh
Abstract:
During the past few years, the Residue Number System (RNS) has been receiving considerable interest due to its parallel and fault-tolerant properties. This system is a useful tool for Digital Signal Processing (DSP) since it can support parallel, carry-free, high-speed and low power arithmetic. One of the drawbacks of Residue Number System is the fractional numbers, that is, the corresponding circuit is very hard to realize in conventional CMOS technology. In this paper, we propose a method in which the numbers of transistors are significantly reduced. The related delay is extremely diminished, in the first glance we use this method to solve concerning problem of one decimal functional number some how this proposition can be extended to generalize the idea. Another advantage of this method is the independency on the kind of moduli.Keywords: computer arithmetic, residue number system, number system, one-Hot, VLSI
Procedia PDF Downloads 4941175 Segmentation of Arabic Handwritten Numeral Strings Based on Watershed Approach
Authors: Nidal F. Shilbayeh, Remah W. Al-Khatib, Sameer A. Nooh
Abstract:
Arabic offline handwriting recognition systems are considered as one of the most challenging topics. Arabic Handwritten Numeral Strings are used to automate systems that deal with numbers such as postal code, banking account numbers and numbers on car plates. Segmentation of connected numerals is the main bottleneck in the handwritten numeral recognition system. This is in turn can increase the speed and efficiency of the recognition system. In this paper, we proposed algorithms for automatic segmentation and feature extraction of Arabic handwritten numeral strings based on Watershed approach. The algorithms have been designed and implemented to achieve the main goal of segmenting and extracting the string of numeral digits written by hand especially in a courtesy amount of bank checks. The segmentation algorithm partitions the string into multiple regions that can be associated with the properties of one or more criteria. The numeral extraction algorithm extracts the numeral string digits into separated individual digit. Both algorithms for segmentation and feature extraction have been tested successfully and efficiently for all types of numerals.Keywords: handwritten numerals, segmentation, courtesy amount, feature extraction, numeral recognition
Procedia PDF Downloads 3791174 Turbulent Flow in Corrugated Pipes with Helical Grooves
Authors: P. Mendes, H. Stel, R. E. M. Morales
Abstract:
This article presents a numerical and experimental study of turbulent flow in corrugated pipes with helically “d-type" grooves, for Reynolds numbers between 7500 and 100,000. The ANSYS-CFX software is used to solve the RANS equations with the BSL two equation turbulence model, through the element-based finite-volume method approach. Different groove widths and helix angles are considered. Numerical results are validated with experimental pressure drop measurements for the friction factor. A correlation for the friction factor is also proposed considering the geometric parameters and Reynolds numbers evaluated.Keywords: turbulent flow, corrugated pipe, helical, numerical, experimental, friction factor, correlation
Procedia PDF Downloads 4791173 Experimental Investigation of S822 and S823 Wind Turbine Airfoils Wake
Authors: Amir B. Khoshnevis, Morteza Mirhosseini
Abstract:
The paper deals with a sub-part of an extensive research program on the wake survey method in various Reynolds numbers and angles of attack. This research experimentally investigates the wake flow characteristics behind S823 and S822 airfoils in which designed for small wind turbines. Velocity measurements determined by using hot-wire anemometer. Data acquired in the wake of the airfoil at locations(c is the chord length): 0.01c - 3c. Reynolds number increased due to increase of free stream velocity. Results showed that mean velocity profiles depend on the angle of attack and location of data collections. Data acquired at the low Reynolds numbers (smaller than 10^5). Effects of Reynolds numbers on the mean velocity profiles are more significant in near locations the trailing edge and these effects decrease by taking distance from trailing edge toward downstream. Mean velocity profiles region increased by increasing the angle of attack, except for 7°, and also the maximum velocity deficit (velocity defect) increased. The difference of mean velocity in and out of the wake decreased by taking distance from trailing edge, and mean velocity profile become wider and more uniform.Keywords: angle of attack, Reynolds number, velocity deficit, separation
Procedia PDF Downloads 3741172 Pythagorean-Platonic Lattice Method for Finding all Co-Prime Right Angle Triangles
Authors: Anthony Overmars, Sitalakshmi Venkatraman
Abstract:
This paper presents a method for determining all of the co-prime right angle triangles in the Euclidean field by looking at the intersection of the Pythagorean and Platonic right angle triangles and the corresponding lattice that this produces. The co-prime properties of each lattice point representing a unique right angle triangle are then considered. This paper proposes a conjunction between these two ancient disparaging theorists. This work has wide applications in information security where cryptography involves improved ways of finding tuples of prime numbers for secure communication systems. In particular, this paper has direct impact in enhancing the encryption and decryption algorithms in cryptography.Keywords: Pythagorean triples, platonic triples, right angle triangles, co-prime numbers, cryptography
Procedia PDF Downloads 2361171 Disabilities in Railways: Proposed Changes to the Design of Railway Compartments for the Inclusion of Differently Abled Persons
Authors: Bathmajaa Muralisankar
Abstract:
As much as railway station infrastructure designs and ticket-booking norms have been changed to facilitate use by differently abled persons, the railway train compartments themselves have not been made user-friendly for differently abled persons. Owing to safety concerns, dependency on others for their travel, and fear of isolation, differently abled people do not prefer travelling by train. Rather than including a dedicated compartment open only to the differently abled, including the latter with others in the normal compartment (with the proposed modifications discussed here) will make them feel secure and make for an enhanced travel experience for them. This approach also represents the most practical way to include a particular category of people in the mainstream society. Lowering the height of the compartment doors and providing a wider entrance with a ramp will provide easy entry for those using wheelchairs. As well, removing the first two alternate rows and the first two side seats will not only widen the passage and increase seating space but also improve wheelchair turning radius. This will help them travel without having to depend on others. Seating arrangements may be done to accommodate their family members near them instead of isolating the differently abled in a separate compartment. According to present ticket-booking regulations of the Indian Railways, three to four disabled persons may travel without their family or one to two along with their family, and the numbers may be added or reduced. To help visually challenged and hearing-impaired persons, in addition to the provision of special instruments, railings, and textured footpaths and flooring, the seat numbers above the seats may be set in metal or plastic as an outward projection so the visually impaired can touch and feel the numbers. Braille boards may be included at the entrance to the compartment along with seat numbers in the aforementioned projected manner. These seat numbers may be designed as buttons, which when pressed results in an announcement of the seat number in the applicable local language as well as English. Emergency buttons, rather than emergency chains, within the easy reach of disabled passengers will also help them.Keywords: dependency, differently abled, inclusion, mainstream society
Procedia PDF Downloads 2531170 Slip Limit Prediction of High-Strength Bolt Joints Based on Local Approach
Authors: Chang He, Hiroshi Tamura, Hiroshi Katsuchi, Jiaqi Wang
Abstract:
In this study, the aim is to infer the slip limit (static friction limit) of contact interfaces in bolt friction joints by analyzing other bolt friction joints with the same contact surface but in a different shape. By using the Weibull distribution to deal with microelements on the contact surface statistically, the slip limit of a certain type of bolt joint was predicted from other types of bolt joint with the same contact surface. As a result, this research succeeded in predicting the slip limit of bolt joins with different numbers of contact surfaces and with different numbers of bolt rows.Keywords: bolt joints, slip coefficient, finite element method, Weibull distribution
Procedia PDF Downloads 1681169 Trinary Affinity—Mathematic Verification and Application (1): Construction of Formulas for the Composite and Prime Numbers
Authors: Liang Ming Zhong, Yu Zhong, Wen Zhong, Fei Fei Yin
Abstract:
Trinary affinity is a description of existence: every object exists as it is known and spoken of, in a system of 2 differences (denoted dif1, dif₂) and 1 similarity (Sim), equivalently expressed as dif₁ / Sim / dif₂ and kn / 0 / tkn (kn = the known, tkn = the 'to be known', 0 = the zero point of knowing). They are mathematically verified and illustrated in this paper by the arrangement of all integers onto 3 columns, where each number exists as a difference in relation to another number as another difference, and the 2 difs as arbitrated by a third number as the Sim, resulting in a trinary affinity or trinity of 3 numbers, of which one is the known, the other the 'to be known', and the third the zero (0) from which both the kn and tkn are measured and specified. Consequently, any number is horizontally specified either as 3n, or as '3n – 1' or '3n + 1', and vertically as 'Cn + c', so that any number seems to occur at the intersection of its X and Y axes and represented by its X and Y coordinates, as any point on Earth’s surface by its latitude and longitude. Technically, i) primes are viewed and treated as progenitors, and composites as descending from them, forming families of composites, each capable of being measured and specified from its own zero called in this paper the realistic zero (denoted 0r, as contrasted to the mathematic zero, 0m), which corresponds to the constant c, and the nature of which separates the composite and prime numbers, and ii) any number is considered as having a magnitude as well as a position, so that a number is verified as a prime first by referring to its descriptive formula and then by making sure that no composite number can possibly occur on its position, by dividing it with factors provided by the composite number formulas. The paper consists of 3 parts: 1) a brief explanation of the trinary affinity of things, 2) the 8 formulas that represent ALL the primes, and 3) families of composite numbers, each represented by a formula. A composite number family is described as 3n + f₁‧f₂. Since there are an infinitely large number of composite number families, to verify the primality of a great probable prime, we have to have it divided with several or many a f₁ from a range of composite number formulas, a procedure that is as laborious as it is the surest way to verifying a great number’s primality. (So, it is possible to substitute planned division for trial division.)Keywords: trinary affinity, difference, similarity, realistic zero
Procedia PDF Downloads 2091168 Behaviours of Energy Spectrum at Low Reynolds Numbers in Grid Turbulence
Authors: Md Kamruzzaman, Lyazid Djenidi, R. A. Antonia
Abstract:
This paper reports an experimental investigation of the energy spectrum of turbulent velocity fields at low Reynolds numbers ( Rλ ) in grid turbulence. Hot wire measurements are carried out in grid turbulence with subjected to a 1.36:1 contraction of the wind tunnel. Three different grids are used: (i) large square perforated grid (mesh size 43.75 mm), (ii) small square perforated grid (mesh size 14 and (iii) woven mesh grid (mesh size 5mm). The results indicate that the energy spectrum at small Rλ does not follow Kolmogorov’s universal scaling. It is further found that the critical Reynolds number,Rλ,ϲ below which the scaling breaks down is around 25.Keywords: energy spectrum, Taylor microscale, Reynolds number, turbulent kinetic energy, decay exponent
Procedia PDF Downloads 2901167 Application of the Discrete Rationalized Haar Transform to Distributed Parameter System
Authors: Joon-Hoon Park
Abstract:
In this paper the rationalized Haar transform is applied for distributed parameter system identification and estimation. A distributed parameter system is a dynamical and mathematical model described by a partial differential equation. And system identification concerns the problem of determining mathematical models from observed data. The Haar function has some disadvantages of calculation because it contains irrational numbers, for these reasons the rationalized Haar function that has only rational numbers. The algorithm adopted in this paper is based on the transform and operational matrix of the rationalized Haar function. This approach provides more convenient and efficient computational results.Keywords: distributed parameter system, rationalized Haar transform, operational matrix, system identification
Procedia PDF Downloads 5071166 Development of Enhanced Data Encryption Standard
Authors: Benjamin Okike
Abstract:
There is a need to hide information along the superhighway. Today, information relating to the survival of individuals, organizations, or government agencies is transmitted from one point to another. Adversaries are always on the watch along the superhighway to intercept any information that would enable them to inflict psychological ‘injuries’ to their victims. But with information encryption, this can be prevented completely or at worst reduced to the barest minimum. There is no doubt that so many encryption techniques have been proposed, and some of them are already being implemented. However, adversaries always discover loopholes on them to perpetuate their evil plans. In this work, we propose the enhanced data encryption standard (EDES) that would deploy randomly generated numbers as an encryption method. Each time encryption is to be carried out, a new set of random numbers would be generated, thereby making it almost impossible for cryptanalysts to decrypt any information encrypted with this newly proposed method.Keywords: encryption, enhanced data encryption, encryption techniques, information security
Procedia PDF Downloads 1481165 Global Production of Systematic Reviews on Population Health Issues in the Middle East and North Africa: Preliminary Results of a Systematic Overview and Bibliometric Analysis, 2008-2016
Authors: Karima Chaabna, Sohaila Cheema, Amit Abraham, Hekmat Alrouh, Ravinder Mamtani, Javaid I. Sheikh
Abstract:
We aimed to assess the production of systematic reviews (SRs) that synthesize observational studies discussing population health issues in the Middle East and North Africa (MENA). Two independent reviewers systematically searched MEDLINE through PubMed. Between 2008-2016, 5,747 articles (reviews, systematic reviews, and meta-analyses) were identified. Following a multi-stage screening process, 387 SRs (with or without meta-analysis) on population health issues in the MENA were included in our overview. Citation numbers for each SR were retrieved from Google Scholar. Impact factor of the journal during the publication year for the included SRs was retrieved from the Institute of Scientific Information’s Journal Citation Report. We conducted linear regression analysis to assess time trends of number of publications according to SRs’ characteristics. We characterized a linear statistically significant increase in the annual numbers of SRs that summarize observational studies on the MENA population health (p-value<0.0001, R2=0.95), from 15 in 2008 to 81 in 2016. Our analysis reveals also linear statistically significant increases in numbers of SRs published by authors affiliated to institutions located inside MENA and/or neighboring countries (N=113, p-value < 0.0001, R²=0.90), by authors located outside MENA (N=155, p-value=0.0007, R²=0.82), and by collaborating authors affiliated to institutions located outside MENA and inside the region and/or in MENA’s neighboring countries (total number of SRs (N)= 119, p-value=0.0004, R²=0.85). Furthermore, these SRs were published in journals with an IF ranging from 0 to 47.8 (median=2.1). Linear statistically significant increases in numbers of published SRs were demonstrated in journals’ impact factor (IF) categories (IF=[0-2[: R²=0.79, p-value=0.0012; IF=[2-4[:R²=0.86, p-value=0.0003; and IF=[4-6[:R²=0.53, p-value=0.026). Additionally, annual numbers of citations to the SRs varied between 0 and 471 (median=7). While each year, a couple of SRs were getting more than 50 annual citations, there were linear statistically significant increases in numbers of published SRs with an annual number of citations at [0-10[(R²=0.89, p-value=0.00014) and at [10-50[ (R²=0.76, p-value=0.0021). Between 2008-2016, increasingly SRs that summarize observational studies on population health issues in the MENA were published. Authors of these SRs were located inside and/or outside the MENA region and an increasing number of collaborations were seen. Increasing numbers of SRs were predominantly observed in journals with an IF between zero and six. Interestingly, SRs covering MENA region countries were being increasingly cited, indicating an escalation of interest in this region’s population health issues.Keywords: bibliometric, citation, impact factor, Middle East and North Africa, population health, systematic review
Procedia PDF Downloads 1541164 Generalization of Blom Key Predistribution Scheme
Authors: Abbas Cheraghi
Abstract:
A key predistribution scheme provides one method to distribute secret ahead of time. Blom’s scheme is a symmetric threshold key exchange protocol in cryptography. The scheme was proposed by the Swedish cryptographer Rolf Blom. In this kind of scheme, trusted authority gives each user a secret key and a public identifier, which enables any two users to create independently a shared key for communicating between each other. However, if an attacker can compromise the keys of at least Known numbers of users, he can break the scheme and reconstruct every shared key. In this paper generalized Blom’s Scheme by multivariate Lagrange interpolation formula. This scheme is a form of threshold secret sharing scheme. In this new scheme, the amount of information transmitted by the trusted authority is independent of the numbers of users. In addition, this scheme is unconditionally secure against any individual user.Keywords: key predistribution, blom’s scheme, secret sharing, unconditional secure
Procedia PDF Downloads 4331163 An Integrated Intuitionistic Fuzzy Elimination Et Choix Traduisant La REalite (IFELECTRE) Model
Authors: Babak Daneshvar Rouyendegh
Abstract:
The aim of this study is to develop and describe a new methodology for the Multi-Criteria Decision-Making (MCDM) problem using Intuitionistic Fuzzy Elimination Et Choix Traduisant La REalite (IFELECTRE) model. The proposed models enable Decision-Makers (DMs) on the assessment and use Intuitionistic Fuzzy numbers (IFN). A numerical example is provided to demonstrate and clarify the proposed analysis procedure. Also, an empirical experiment is conducted to validation the effectiveness.Keywords: Decision-Makers (DMs), Multi-Criteria Decision-Making (MCDM), Intuitionistic Fuzzy Elimination Et Choix Traduisant La REalite (IFELECTRE), Intuitionistic Fuzzy Numbers (IFN)
Procedia PDF Downloads 6781162 Efficient Numerical Simulation for LDC
Authors: Badr Alkahtani
Abstract:
In this poster, numerical solutions of two-dimensional and three-dimensional lid driven cavity are presented by solving the steady Navier-Stokes equations at high Reynolds numbers where it becomes difficult. Lid driven cavity is where the a fluid contained in a cube and the upper wall is moving. In two dimensions, we use the streamfunction-vorticity formulation to solve the problem in a square domain. A numerical method is employed to discretize the problem in the x and y directions with a spectral collocation method. The problem is coded in the MATLAB programming environment. Solutions at high Reynolds numbers are obtained up to Re=20000 on a fine grid of 131 * 131. Also in this presentation, the numerical solutions for the three-dimensional lid-driven cavity problem are obtained by solving the velocity-vorticity formulation of the Navier-Stokes equations (which is the first time that this has been simulated with special boundary conditions) for various Reynolds numbers. A spectral collocation method is employed to discretize the y and z directions and a finite difference method is used to discretize the x direction. Numerical solutions are obtained for Reynolds number up to 200. , The work prepared here is to show the efficiency of methods used to simulate the physical problem where accurate simulations of lid driven cavity are obtained at high Reynolds number as mentioned above. The result for the two dimensional problem is far from the previous researcher result.Keywords: lid driven cavity, navier-stokes, simulation, Reynolds number
Procedia PDF Downloads 711