Search results for: secure information flow
14885 Numerical Study of Heat Transfer and Laminar Flow over a Backward Facing Step with and without Obstacle
Authors: Hussein Togun, Tuqa Abdulrazzaq, S. N. Kazi, A. Badarudin, M. K. A. Ariffin, M. N. M. Zubir
Abstract:
Heat transfer and laminar fluid flow over backward facing step with and without obstacle numerically studied in this paper. The finite volume method adopted to solve continuity, momentum and energy equations in two dimensions. Backward facing step without obstacle and with different dimension of obstacle were presented. The step height and expansion ratio of channel were 4.8mm and 2 respectively, the range of Reynolds number varied from 75 to 225, constant heat flux subjected on downstream of wall was 2000W/m2, and length of obstacle was 1.5, 3, and 4.5mm with width 1.5mm. The separation length noticed increase with increase Reynolds number and height of obstacle. The result shows increase of heat transfer coefficient for backward facing step with obstacle in compared to those without obstacle. The maximum enhancement of heat transfer observed at 4.5mm of height obstacle due to increase recirculation flow after the obstacle in addition that at backward. Streamline of velocity showing the increase of recirculation region with used obstacle in compared without obstacle and highest recirculation region observed at obstacle height 4.5mm. The amount of enhancement heat transfer was varied between 3-5% compared to backward without obstacle.Keywords: separation flow, backward facing step, heat transfer, laminar flow
Procedia PDF Downloads 46814884 Providing Support On-Time: Need to Establish De-Radicalization Hotlines
Authors: Ashir Ahmed
Abstract:
Peacekeeping is a collective responsibility of governments, law enforcement agencies, communities, families, and individuals. Moreover, the complex nature of peacekeeping activities requires a holistic and collaborative approach where various community sectors work together to form collective strategies that are likely to be more effective than strategies designed and delivered in isolation. Similarly, it is important to learn from past programs to evaluate the initiatives that have worked well and the areas that need further improvement. Review of recent peacekeeping initiatives suggests that there have been tremendous efforts and resources put in place to deal with the emerging threat of terrorism, radicalization and violent extremism through number of de-radicalization programs. Despite various attempts in designing and delivering successful programs for deradicalization, the threat of people being radicalized is growing more than ever before. This research reviews the prominent de-radicalization programs to draw an understanding of their strengths and weaknesses. Some of the weaknesses in the existing programs include. Inaccessibility: Limited resources, geographical location of potential participants (for offline programs), inaccessibility or inability to use various technologies (for online programs) makes it difficult for people to participate in de-radicalization programs. Timeliness: People might need to wait for a program on a set date/time to get the required information and to get their questions answered. This is particularly true for offline programs. Lack of trust: The privacy issues and lack of trust between participants and program organizers are another hurdle in the success of de-radicalization programs. The fear of sharing participants information with organizations (such as law enforcement agencies) without their consent led them not to participate in these programs. Generalizability: Majority of these programs are very generic in nature and do not cater the specific needs of an individual. Participants in these programs may feel that the contents are irrelevant to their individual situations and hence feel disconnected with purpose of the programs. To address the above-mentioned weaknesses, this research developed a framework that recommends some improvements in de-radicalization programs. One of the recommendations is to offer 24/7, secure, private and online hotline (also referred as helpline) for the people who have any question, concern or situation to discuss with someone who is qualified (a counsellor) to deal with people who are vulnerable to be radicalized. To make these hotline services viable and sustainable, the existing organizations offering support for depression, anxiety or suicidal ideation could additionally host these services. These helplines should be available via phone, the internet, social media and in-person. Since these services will be embedded within existing and well-known services, they would likely to get more visibility and promotion. The anonymous and secure conversation between a person and a counsellor would ensure that a person can discuss the issues without being afraid of information sharing with any third party – without his/her consent. The next stage of this project would include the operationalization of the framework by collaborating with other organizations to host de-radicalization hotlines and would assess the effectiveness of such initiatives.Keywords: de-radicalization, framework, hotlines, peacekeeping
Procedia PDF Downloads 21414883 Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database
Authors: Manvar Sagar, Nikul Virpariya
Abstract:
The advancement in data mining techniques plays an important role in many applications. In context of privacy and security issues, the problems caused by association rule mining technique are investigated by many research scholars. It is proved that the misuse of this technique may reveal the database owner’s sensitive and private information to others. Many researchers have put their effort to preserve privacy in Association Rule Mining. Amongst the two basic approaches for privacy preserving data mining, viz. Randomization based and Cryptography based, the later provides high level of privacy but incurs higher computational as well as communication overhead. Hence, it is necessary to explore alternative techniques that improve the over-heads. In this work, we propose an efficient, collusion-resistant cryptography based approach for distributed Association Rule mining using Shamir’s secret sharing scheme. As we show from theoretical and practical analysis, our approach is provably secure and require only one time a trusted third party. We use secret sharing for privately sharing the information and code based identification scheme to add support against malicious adversaries.Keywords: Privacy, Privacy Preservation in Data Mining (PPDM), horizontally partitioned database, EMHS, MFI, shamir secret sharing
Procedia PDF Downloads 40814882 Multiphase Flow Model for 3D Numerical Model Using ANSYS for Flow over Stepped Cascade with End Sill
Authors: Dheyaa Wajid Abbood, Hanan Hussien Abood
Abstract:
Stepped cascade has been utilized as a hydraulic structure for years. It has proven to be the least costly aeration system in replenishing dissolved oxygen. Numerical modeling of stepped cascade with end sill is very complicated and challenging because of the high roughness and velocity re circulation regions. Volume of fluid multiphase flow model (VOF) is used .The realizable k-ξ model is chosen to simulate turbulence. The computational results are compared with lab-scale stepped cascade data. The lab –scale model was constructed in the hydraulic laboratory, Al-Mustansiriya University, Iraq. The stepped cascade was 0.23 m wide and consisted of 3 steps each 0.2m high and 0.6 m long with variable end sill. The discharge was varied from 1 to 4 l/s. ANSYS has been employed to simulate the experimental data and their related results. This study shows that ANSYS is able to predict results almost the same as experimental findings in some regions of the structure.Keywords: stepped cascade weir, aeration, multiphase flow model, ansys
Procedia PDF Downloads 33614881 The Effect of Blood Flow Restriction on the Knee Rehabilitation
Authors: O. Casasayas, M. Vigo, R. Navarro, P. Ragazzi, P. Alvarez, A. Perez-Bellmunt
Abstract:
Introduction: The blood flow restriction training (BFR) is a method of muscle training that allows increasing the stress of muscle tissue to enhance the muscle cross-section and strength. This type of training has clear benefits in the rehabilitation field since it can improve muscle strength using low mechanical loads. The aim of this study is to know in which knee pathologies BFR has been used, what methodology was used and what were the obtained results. Study design: We performed a systematic literature search using strategies for the concepts of “blood flow restriction OR blood flow restriction training AND knee” in Medline. Articles were screened by authors and included if they used the blood flow restriction training in pathology of the knee. Results: The pathology more frequently treated by BFR was knee osteoarthritis and the variables most analyzed were strength and pain. The vascular occlusion used was 80% in the major part of studies. The groups of BFR obtained an increase of strength with less pain but not always the results are statistically significant. The evidence levels are poor in the high number of studies because in some cases there is not a control group or the evaluators were not blinded. Conclusion: The use of BFR is useful to improve muscle strength in knee pathology since it does not increase the pain, but more studies are needed to see (comprehend) if this type of treatment obtains better results than a conventional therapy. No studies have been found that compare the different occlusion effects in both the strength improvement and the pain reduction. Neither studies that analyse the effects of BFR on the muscle contractile parameters have been found.Keywords: blood flow restriction training, knee, arthroscopy knee, physical therapy
Procedia PDF Downloads 16814880 Soret and Dufour's Effects on Mixed Convection Unsteady MHD Boundary Layer Flow over a Stretching Sheet Embedded in a Porous Medium with Chemically Reactive Spices
Authors: Deva Kanta Phukan
Abstract:
An investigation is made to carry out to study the thermal-diffusion and diffusion thermo-effects in hydro-magnetic unsteady flow by a mixed convection boundary layer past an impermeable vertical stretching sheet embedded in a conducting fluid-saturated porous medium in the presence of a chemical reaction effect. The velocity of stretching surface, the surface temperature and the concentration are assumed to vary linearly with the distance along the surface. The governing partial differential equations are transformed in to self similar unsteady equations using similarity transformations and solved numerically by the Runge kutta fourth order scheme in association with the shooting method for the whole transient domain from the initial state to the final steady state flow. Numerical results for the velocity, temperature, the concentration, the skin friction , and the Nusselt and Sherwood numbers are shown graphically for various flow parameters. The results reveal that there is a smooth transition of flow from unsteady state to the final steady state. A special case of our results is in good agreement with an earlier published work.Keywords: heat and mass transfer, boundary layer flow, porous media, magnetic field, Soret number, Dufour’s number
Procedia PDF Downloads 44514879 Spillage Prediction Using Fluid-Structure Interaction Simulation with Coupled Eulerian-Lagrangian Technique
Authors: Ravi Soni, Irfan Pathan, Manish Pande
Abstract:
The current product development process needs simultaneous consideration of different physics. The performance of the product needs to be considered under both structural and fluid loads. Examples include ducts and valves where structural behavior affects fluid motion and vice versa. Simulation of fluid-structure interaction involves modeling interaction between moving components and the fluid flow. In these scenarios, it is difficult to calculate the damping provided by fluid flow because of dynamic motions of components and the transient nature of the flow. Abaqus Explicit offers general capabilities for modeling fluid-structure interaction with the Coupled Eulerian-Lagrangian (CEL) method. The Coupled Eulerian-Lagrangian technique has been used to simulate fluid spillage through fuel valves during dynamic closure events. The technique to simulate pressure drops across Eulerian domains has been developed using stagnation pressure. Also, the fluid flow is calculated considering material flow through elements at the outlet section of the valves. The methodology has been verified on Eaton products and shows a good correlation with the test results.Keywords: Coupled Eulerian-Lagrangian Technique, fluid structure interaction, spillage prediction, stagnation pressure
Procedia PDF Downloads 37914878 A Passive Digital Video Authentication Technique Using Wavelet Based Optical Flow Variation Thresholding
Authors: R. S. Remya, U. S. Sethulekshmi
Abstract:
Detecting the authenticity of a video is an important issue in digital forensics as Video is used as a silent evidence in court such as in child pornography, movie piracy cases, insurance claims, cases involving scientific fraud, traffic monitoring etc. The biggest threat to video data is the availability of modern open video editing tools which enable easy editing of videos without leaving any trace of tampering. In this paper, we propose an efficient passive method for inter-frame video tampering detection, its type and location by estimating the optical flow of wavelet features of adjacent frames and thresholding the variation in the estimated feature. The performance of the algorithm is compared with the z-score thresholding and achieved an efficiency above 95% on all the tested databases. The proposed method works well for videos with dynamic (forensics) as well as static (surveillance) background.Keywords: discrete wavelet transform, optical flow, optical flow variation, video tampering
Procedia PDF Downloads 35914877 Research on Evaluation Method of Urban Road Section Traffic Safety Status Based on Video Information
Authors: Qiang Zhang, Xiaojian Hu
Abstract:
Aiming at the problem of the existing real-time evaluation methods for traffic safety status, a video information-based urban road section traffic safety status evaluation method was established, and the rapid detection method of traffic flow parameters based on video information is analyzed. The concept of the speed dispersion of the road section that affects the traffic safety state of the urban road section is proposed, and the method of evaluating the traffic safety state of the urban road section based on the speed dispersion of the road section is established. Experiments show that the proposed method can reasonably evaluate the safety status of urban roads in real-time, and the evaluation results can provide a corresponding basis for the traffic management department to formulate an effective urban road section traffic safety improvement plan.Keywords: intelligent transportation system, road traffic safety, video information, vehicle speed dispersion
Procedia PDF Downloads 16414876 Influence of Major Axis on the Aerodynamic Characteristics of Elliptical Section
Authors: K. B. Rajasekarababu, J. Karthik, G. Vinayagamurthy
Abstract:
This paper is intended to explain the influence of major axis on aerodynamic characteristics of elliptical section. Many engineering applications such as off shore structures, bridge piers, civil structures and pipelines can be modelled as a circular cylinder but flow over complex bodies like, submarines, Elliptical wing, fuselage, missiles, and rotor blades, in which the parameters such as axis ratio can influence the flow characteristics of the wake and nature of separation. Influence of Major axis in Flow characteristics of elliptical sections are examined both experimentally and computationally in this study. For this research, four elliptical models with varying major axis [*AR=1, 4, 6, 10] are analysed. Experimental works have been conducted in a subsonic wind tunnel. Furthermore, flow characteristics on elliptical model are predicted from k-ε turbulence model using the commercial CFD packages by pressure based transient solver with Standard wall conditions.The analysis can be extended to estimation and comparison of Drag coefficient and Fatigue analysis of elliptical sections.Keywords: elliptical section, major axis, aerodynamic characteristics, k-ε turbulence model
Procedia PDF Downloads 43614875 Measurement of Turbulence with PITOT Static Tube in Low Speed Subsonic Wind Tunnel
Authors: Gopikrishnan, Bharathiraja, Boopalan, Jensin Joshua
Abstract:
The Pitot static tube has proven their values and practicability in measuring velocity of fluids for many years. With the aim of extensive usage of such Pitot tube systems, one of the major enabling technologies is to use the design and fabricate a high sensitive pitot tube for the purpose of calibration of the subsonic wind tunnel. Calibration of wind tunnel is carried out by using different instruments to measure variety of parameters. Using too many instruments inside the tunnel may not only affect the fluid flow but also lead to drag or losses. So, it is essential to replace the different system with a single system that would give all the required information. This model of high sensitive Pitot tube has been designed to ease the calibration process. It minimizes the use of different instruments and this single system is capable of calibrating the wind tunnel test section. This Pitot static tube is completely digitalized and so that the velocity data`s can be collected directly from the instrument. Since the turbulence factors are dependent on velocity, the data’s that are collected from the pitot static tube are then processed and the level of turbulence in the fluid flow is calculated. It is also capable of measuring the pressure distribution inside the wind tunnel and the flow angularity of the fluid. Thus, the well-designed high sensitive Pitot static tube is utilized in calibrating the tunnel and also for the measurement of turbulence.Keywords: pitot static tube, turbulence, wind tunnel, velocity
Procedia PDF Downloads 52614874 Management Information System to Help Managers for Providing Decision Making in an Organization
Authors: Ajayi Oluwasola Felix
Abstract:
Management information system (MIS) provides information for the managerial activities in an organization. The main purpose of this research is, MIS provides accurate and timely information necessary to facilitate the decision-making process and enable the organizations planning control and operational functions to be carried out effectively. Management information system (MIS) is basically concerned with processing data into information and is then communicated to the various departments in an organization for appropriate decision-making. MIS is a subset of the overall planning and control activities covering the application of humans technologies, and procedures of the organization. The information system is the mechanism to ensure that information is available to the managers in the form they want it and when they need it.Keywords: Management Information Systems (MIS), information technology, decision-making, MIS in Organizations
Procedia PDF Downloads 55614873 Allocating Channels and Flow Estimation at Flood Prone Area in Desert, Example from AlKharj City, Saudi Arabia
Authors: Farhan Aljuaidi
Abstract:
The rapid expansion of Alkarj city, Saudi Arabia, towards the outlet of Wadi AlAin is critical for the planners and decision makers. Nowadays, two major projects such as Salman bin Abdulaziz University compound and new industrial area are developed in this flood prone area where no channels are clear and identified. The main contribution of this study is to divert the flow away from these vital projects by reconstructing new channels. To do so, Lidar data were used to generate contour lines for the actual elevation of the highways and local roads. These data were analyzed and compared to the contour lines derived from the topographical maps 1:50.000. The magnitude of the expected flow was estimated using Snyder's Model based on the morphometric data acquired by DEM of the catchment area. The results indicate that maximum discharge peak reaches 2694,3 m3/sec, the mean is 303,7 m3/sec and the minimum is 74,3 m3/sec. The runoff was estimated at 252,2. 610 m3/s, the mean is 41,5. 610 m3/s and the minimum is 12,4. 610 m3/s.Keywords: Desert flood, Saudi Arabia, Snyder's Model, flow estimation
Procedia PDF Downloads 30914872 Performance Evaluation of Conical Solar Concentrator System with Different Flow Rate
Authors: Gwi Hyun Lee, Mun Soo Na
Abstract:
Solar energy has many advantages of infinite and clean source, and also it can be used for reduction of greenhouse gases and environment pollution. Concentrated solar system is a very useful to achieve reasonably high thermal efficiency. Different types of solar concentrating systems have been developed such as parabolic trough and parabolic dish. Conical solar concentrator is one of the most reliable and promising renewable energy systems for higher temperature applications. The objectives of this study were to investigate the influence of flow rate affecting the thermal efficiency of a conical solar collector, which has a double tube absorber placed at focal axis for collecting solar radiation. A conical solar concentrator consists of a conical reflector, which reflects direct solar radiation into an absorber. A double tube absorber was placed at the center of focal axis for collecting the solar radiation reflected from a conical reflector. A dual tracking system consists of a linear actuator and slew drive with driving cycle of 6 seconds. Water was used as circulating fluid, which flows from inlet to outlet of an absorber for collecting solar radiation. Three identical conical solar concentrator systems were installed side by side at the same place for the accurate performance analysis under the same environmental conditions. Performance evaluations were carried out with different volumetric flow rate of 2, 4 and 6 L/min to find the influence of flow rate affecting on thermal efficiency. The results indicated that average thermal efficiency was 73.24%, 81.96%, and 79.78% for each flow rate of 2 L/min, 4 L/min, and 6 L/min. It shows that the flow rate of circulating water has a significant effect on the thermal efficiency of the conical solar concentrator. It is concluded that an optimum flow rate of conical solar concentrator is 6 L/min.Keywords: conical solar concentrator, performance evaluation, solar energy, solar energy system
Procedia PDF Downloads 27914871 Effects of Variable Viscosity on Radiative MHD Flow in a Porous Medium Between Twovertical Wavy Walls
Authors: A. B. Disu, M. S. Dada
Abstract:
This study was conducted to investigate two dimensional heat transfer of a free convective-radiative MHD (Magneto-hydrodynamics) flow with temperature dependent viscosity and heat source of a viscous incompressible fluid in a porous medium between two vertical wavy walls. The fluid viscosity is assumed to vary as an exponential function of temperature. The flow is assumed to consist of a mean part and a perturbed part. The perturbed quantities were expressed in terms of complex exponential series of plane wave equation. The resultant differential equations were solved by Differential Transform Method (DTM). The numerical computations were presented graphically to show the salient features of the fluid flow and heat transfer characteristics. The skin friction and Nusselt number were also analyzed for various governing parameters.Keywords: differential transform method, MHD free convection, porous medium, two dimensional radiation, two wavy walls
Procedia PDF Downloads 44714870 Approximation of a Wanted Flow via Topological Sensitivity Analysis
Authors: Mohamed Abdelwahed
Abstract:
We propose an optimization algorithm for the geometric control of fluid flow. The used approach is based on the topological sensitivity analysis method. It consists in studying the variation of a cost function with respect to the insertion of a small obstacle in the domain. Some theoretical and numerical results are presented in 2D and 3D.Keywords: sensitivity analysis, topological gradient, shape optimization, stokes equations
Procedia PDF Downloads 53714869 Characteristics of Ozone Generated from Dielectric Barrier Discharge Plasma Actuators
Authors: R. Osada, S. Ogata, T. Segawa
Abstract:
Dielectric barrier discharge plasma actuators (DBD-PAs) have been developed for active flow control devices. However, it is necessary to reduce ozone produced by DBD toward practical applications using DBD-PAs. In this study, variations of ozone concentration, flow velocity, power consumption were investigated by changing exposed electrodes of DBD-PAs. Two exposed electrode prototypes were prepared: span-type with exposed electrode width of 0.1 mm, and normal-type with width of 5 mm. It was found that span-type shows lower power consumption and higher flow velocity than that of normal-type at Vp-p = 4.0-6.0 kV. Ozone concentration of span-type higher than normal-type at Vp-p = 4.0-8.0 kV. In addition, it was confirmed that catalyst located in downstream from the exposed electrode can reduce ozone concentration between 18 and 42% without affecting the induced flow.Keywords: dielectric barrier discharge plasma actuators, ozone diffusion, PIV measurement, power consumption
Procedia PDF Downloads 24114868 Large Eddy Simulation Approach for Unsteady Analysis of the Flow Behavior inside a Dual Counter Rotating Axial Swirler
Authors: Foad Vashahi, Shahnaz Rezaei, Jeekeun Lee
Abstract:
Large Eddy Simulation (LES) was performed on a dual counter rotating axial swirler in a confined rectangular configuration. Grids were constructed based on a primary Reynolds Averaged Navier-Stokes (RANS) simulation and then were refined based on the Kolmogorov length scale. Water as cold flow condition was applied and results were compared via Particle Image Velocimetry (PIV) experimental results. The focus was to investigate the flow behavior within the region before the flare and very close to the exit of the swirler. This region contributes to a highly unsteady flow behavior and requires great attention to enhancing the flame stability in gas turbine combustor and swirl burners. The PVC formation within the central core flow is strongly related to the peaks of pressure or axial velocity spectrum and up to two distinct peaks at the swirler mouth could be observed. Here, spectra analysis in iso-thermal condition inside the swirler where the inner swirler dominates the flow, showed a higher potential of instabilities with three to four distinct peaks where moving forward to the exit of swirler the number of peaks is decreased. In addition to this, the central axis corresponds to no peaks of instabilities while further away in the radial direction, several peaks exist.Keywords: axial counter rotating swirler, large eddy simulation (LES), precessing vortex core (PVC), power spectral density (PSD)
Procedia PDF Downloads 28014867 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues
Authors: Muhammad Muhammad Suleiman
Abstract:
Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.Keywords: cloud computing, steganography, information hiding, cloud storage, security
Procedia PDF Downloads 19114866 Desktop High-Speed Aerodynamics by Shallow Water Analogy in a Tin Box for Engineering Students
Authors: Etsuo Morishita
Abstract:
In this paper, we show shallow water in a tin box as an analogous simulation tool for high-speed aerodynamics education and research. It is customary that we use a water tank to create shallow water flow. While a flow in a water tank is not necessarily uniform and is sometimes wavy, we can visualize a clear supercritical flow even when we move a body manually in stationary water in a simple shallow tin box. We can visualize a blunt shock wave around a moving circular cylinder together with a shock pattern around a diamond airfoil. Another interesting analogous experiment is a hydrodynamic shock tube with water and tea. We observe the contact surface clearly due to color difference of the two liquids those are invisible in the real gas dynamics experiment. We first revisit the similarities between high-speed aerodynamics and shallow water hydraulics. Several educational and research experiments are then introduced for engineering students. Shallow water experiments in a tin box simulate properly the high-speed flows.Keywords: aerodynamics compressible flow, gas dynamics, hydraulics, shock wave
Procedia PDF Downloads 30214865 A New Car-Following Model with Consideration of the Brake Light
Authors: Zhiyuan Tang, Ju Zhang, Wenyuan Wu
Abstract:
In this research, a car-following model with consideration of the status of the brake light is proposed. The numerical results show that the stability of the traffic flow is improved. The ability of the brake light to reduce car accident is also showed.Keywords: brake light, car-following model, traffic flow, regional planning, transportation
Procedia PDF Downloads 57914864 Geometrical Based Unequal Droplet Splitting Using Microfluidic Y-Junction
Authors: Bahram Talebjedi, Amirmohammad Sattari, Ahmed Zoher Sihorwala, Mina Hoorfar
Abstract:
Among different droplet manipulations, controlled droplet-splitting is of great significance due to its ability to increase throughput and operational capability. Furthermore, unequal droplet-splitting can provide greater flexibility and a wider range of dilution factors. In this study, we developed two-dimensional, time-dependent complex fluid dynamics simulations to model droplet formation in a flow focusing device, followed by splitting in a Y-shaped junction with sub-channels of unequal widths. From the results obtained from the numerical study, we correlated the diameters of the droplets in the sub-channels to the Weber number, thereby demarcating the droplet splitting and non-splitting regimes.Keywords: microfluidics, unequal droplet splitting, two phase flow, flow focusing device
Procedia PDF Downloads 16714863 Influence of Nanoparticles Phenomena on the Peristaltic Flow of Pseudoplastic Fluid in an Inclined Asymmetric Channel with Different Wave Forms
Authors: Safia Akram
Abstract:
The influence of nanofluid with different waveforms in the presence of inclined asymmetric channel on peristaltic transport of a pseudoplastic fluid is examined. The governing equations for two-dimensional and two directional flows of a pseudoplastic fluid along with nanofluid are modeled and then simplified under the assumptions of long wavelength and low Reynolds number approximation. The exact solutions for temperature and nanoparticle volume fraction are calculated. Series solution of the stream function and pressure gradient are carried out using perturbation technique. The flow quantities have been examined for various physical parameters of interest. It was found, that the magnitude value of the velocity profile decreases with an increase in volume flow rate (Q) and relaxation times (ζ) and increases in sinusoidal, multisinusoidal, trapezoidal and triangular waves. It was also observed that the size of the trapping bolus decreases with the drop of the width of the channel ‘d’ and increases with a rise of relaxation times ζ.Keywords: nanofluid particles, peristaltic flow, pseudoplastic fluid, different waveforms, inclined asymmetric channel
Procedia PDF Downloads 23714862 Numerical Investigation of Two Turbulence Models for Predicting the Temperature Separation in Conical Vortex Tube
Authors: M. Guen
Abstract:
A three-dimensional numerical study is used to analyze the behavior of the flow inside a vortex tube. The vortex tube or Ranque-Hilsch vortex tube is a simple device which is capable of dividing compressed air from the inlet nozzle tangentially into two flow with different temperatures warm and cold. This phenomenon is known from literature by temperature separation. The K ω-SST and K-ε turbulence models are used to predict the turbulent flow behaviour inside the tube. The vortex tube is an Exair 708 slpm (25 scfm) commercial tube. The cold and hot exits areas are 30.2 and 95 mm2 respectively. The vortex nozzle consists of 6 straight slots; the height and the width of each slot are 0.97 mm and 1.41 mm. The total area normal to the flow associated with six nozzles is therefore 8.15 mm 2. The present study focuses on a comparison between two turbulence models K ω-SST, K-ε by using a new configuration of vortex tube (Conical Vortex Tube). The performance curves of the temperature separation versus cold outlet mass fraction were calculated and compared with experimental and numerical study of other researchers.Keywords: conical vortex tube, temperature separation, cold mass fraction, turbulence
Procedia PDF Downloads 24914861 Effect of Different Porous Media Models on Drug Delivery to Solid Tumors: Mathematical Approach
Authors: Mostafa Sefidgar, Sohrab Zendehboudi, Hossein Bazmara, Madjid Soltani
Abstract:
Based on findings from clinical applications, most drug treatments fail to eliminate malignant tumors completely even though drug delivery through systemic administration may inhibit their growth. Therefore, better understanding of tumor formation is crucial in developing more effective therapeutics. For this purpose, nowadays, solid tumor modeling and simulation results are used to predict how therapeutic drugs are transported to tumor cells by blood flow through capillaries and tissues. A solid tumor is investigated as a porous media for fluid flow simulation. Most of the studies use Darcy model for porous media. In Darcy model, the fluid friction is neglected and a few simplified assumptions are implemented. In this study, the effect of these assumptions is studied by considering Brinkman model. A multi scale mathematical method which calculates fluid flow to a solid tumor is used in this study to investigate how neglecting fluid friction affects the solid tumor simulation. In this work, the mathematical model in our previous studies is developed by considering two model of momentum equation for porous media: Darcy and Brinkman. The mathematical method involves processes such as fluid flow through solid tumor as porous media, extravasation of blood flow from vessels, blood flow through vessels and solute diffusion, convective transport in extracellular matrix. The sprouting angiogenesis model is used for generating capillary network and then fluid flow governing equations are implemented to calculate blood flow through the tumor-induced capillary network. Finally, the two models of porous media are used for modeling fluid flow in normal and tumor tissues in three different shapes of tumors. Simulations of interstitial fluid transport in a solid tumor demonstrate that the simplifications used in Darcy model affect the interstitial velocity and Brinkman model predicts a lower value for interstitial velocity than the values that Darcy model does.Keywords: solid tumor, porous media, Darcy model, Brinkman model, drug delivery
Procedia PDF Downloads 30614860 Flow Characterization in Complex Terrain for Aviation Safety
Authors: Adil Rasheed, Mandar Tabib
Abstract:
The paper describes the ability of a high-resolution Computational Fluid Dynamics model to predict terrain-induced turbulence and wind shear close to the ground. Various sensitivity studies to choose the optimal simulation setup for modeling the flow characteristics in a complex terrain are presented. The capabilities of the model are demonstrated by applying it to the Sandnessjøen Airport, Stokka in Norway, an airport that is located in a mountainous area. The model is able to forecast turbulence in real time and trigger an alert when atmospheric conditions might result in high wind shear and turbulence.Keywords: aviation safety, terrain-induced turbulence, atmospheric flow, alert system
Procedia PDF Downloads 41614859 Analysis of Syngas Combustion Characteristics in Can-Type Combustor using CFD
Authors: Norhaslina Mat Zian, Hasril Hasini, Nur Irmawati Om
Abstract:
This study focuses on the flow and combustion behavior inside gas turbine combustor used in thermal power plant. The combustion process takes place using synthetic gas and the baseline solution was made on gas turbine combustor firing natural gas (100% Methane) as the main source of fuel. Attention is given to the effect of the H2/CO ratio on the variation of the flame profile, temperature distribution, and emissions. The H2/CO ratio varies in the range of 10-80 % and the CH4 values are fixed 10% for each case. While keeping constant the mass flow rate and operating pressure, the preliminary result shows that the flow inside the can-combustor is highly swirling which indicates good mixing of fuel and air prior to the entrance of the mixture to the main combustion zone.Keywords: cfd, combustion, flame, syngas
Procedia PDF Downloads 28414858 Analysis of Two-Phase Flow Instabilities in Conventional Channel of Nuclear Power Reactor
Authors: M. Abdur Rashid Sarkar, Riffat Mahmud
Abstract:
Boiling heat transfer plays a crucial role in cooling nuclear reactor for safe electricity generation. A two phase flow is susceptible to thermal-hydrodynamic instabilities, which may cause flow oscillations of constant amplitude or diverging amplitude. These oscillations may induce boiling crisis, disturb control systems, or cause mechanical damage. Based on their mechanisms, various types of instabilities can be classified for a nuclear reactor. From a practical engineering point of view one of the major design difficulties in dealing with multiphase flow is that the mass, momentum, and energy transfer rates and processes may be quite sensitive to the geometric configuration of the heat transfer surface. Moreover, the flow within each phase or component will clearly depend on that geometric configuration. The complexity of this two-way coupling presents a major challenge in the study of multiphase flows and there is much that remains to be done. Yet, the parametric effects on flow instability such as the effect of aspect ratio, pressure drop, channel length, its orientation inlet subcooling and surface roughness etc. have been analyzed. Another frequently occurring instability, known as the Kelvin–Helmholtz instability has been briefly reviewed. Various analytical techniques for predicting parametric effect on the instability are analyzed in terms of their applicability and accuracy.Keywords: two phase flows, boiling crisis, thermal-hydrodynamic instabilities, water cooled nuclear reactors, kelvin–helmholtz instability
Procedia PDF Downloads 39714857 An Efficient Discrete Chaos in Generalized Logistic Maps with Applications in Image Encryption
Authors: Ashish Ashish
Abstract:
In the last few decades, the discrete chaos of difference equations has gained a massive attention of academicians and scholars due to its tremendous applications in each and every branch of science, such as cryptography, traffic control models, secure communications, weather forecasting, and engineering. In this article, a generalized logistic discrete map is established and discrete chaos is reported through period doubling bifurcation, period three orbit and Lyapunov exponent. It is interesting to see that the generalized logistic map exhibits superior chaos due to the presence of an extra degree of freedom of an ordered parameter. The period doubling bifurcation and Lyapunov exponent are demonstrated for some particular values of parameter and the discrete chaos is determined in the sense of Devaney's definition of chaos theoretically as well as numerically. Moreover, the study discusses an extended chaos based image encryption and decryption scheme in cryptography using this novel system. Surprisingly, a larger key space for coding and more sensitive dependence on initial conditions are examined for encryption and decryption of text messages, images and videos which secure the system strongly from external cyber attacks, coding attacks, statistic attacks and differential attacks.Keywords: chaos, period-doubling, logistic map, Lyapunov exponent, image encryption
Procedia PDF Downloads 15114856 Electronic Patient Record (EPR) System in South Africa: Results of a Pilot Study
Authors: Temitope O. Tokosi, Visvanathan Naicker
Abstract:
Patient health records contain sensitive information for which an electronic patient record (EPR) system can safely secure and transmit amongst clinicians for use in improving health delivery. Clinician’s use of the behaviour of these systems is under scrutiny to assess their attributes towards health technology. South Africa (SA) clinicians responded to a pilot study survey to assess their understanding of EPR, what attributes are important towards technology use and more importantly streamlining the survey for a larger study. Descriptive statistics using mean scores was used because of the small sample size of 11 clinicians who completed the survey. Nine (9) constructs comprising 62 items were used and a Cronbach alpha score of 0.883 was obtained. Limitations and discussions conclude the study.Keywords: EPR, clinicians, pilot study, South Africa
Procedia PDF Downloads 264