Search results for: computational musicology
1265 An Exact Algorithm for Location–Transportation Problems in Humanitarian Relief
Authors: Chansiri Singhtaun
Abstract:
This paper proposes a mathematical model and examines the performance of an exact algorithm for a location–transportation problems in humanitarian relief. The model determines the number and location of distribution centers in a relief network, the amount of relief supplies to be stocked at each distribution center and the vehicles to take the supplies to meet the needs of disaster victims under capacity restriction, transportation and budgetary constraints. The computational experiments are conducted on the various sizes of problems that are generated. Branch and bound algorithm is applied for these problems. The results show that this algorithm can solve problem sizes of up to three candidate locations with five demand points and one candidate location with up to twenty demand points without premature termination.Keywords: disaster response, facility location, humanitarian relief, transportation
Procedia PDF Downloads 4511264 Influence of Intra-Yarn Permeability on Mesoscale Permeability of Plain Weave and 3D Fabrics
Authors: Debabrata Adhikari, Mikhail Matveev, Louise Brown, Andy Long, Jan Kočí
Abstract:
A good understanding of mesoscale permeability of complex architectures in fibrous porous preforms is of particular interest in order to achieve efficient and cost-effective resin impregnation of liquid composite molding (LCM). Fabrics used in structural reinforcements are typically woven or stitched. However, 3D fabric reinforcement is of particular interest because of the versatility in the weaving pattern with the binder yarn and in-plain yarn arrangements to manufacture thick composite parts, overcome the limitation in delamination, improve toughness etc. To predict the permeability based on the available pore spaces between the inter yarn spaces, unit cell-based computational fluid dynamics models have been using the Stokes Darcy model. Typically, the preform consists of an arrangement of yarns with spacing in the order of mm, wherein each yarn consists of thousands of filaments with spacing in the order of μm. The fluid flow during infusion exchanges the mass between the intra and inter yarn channels, meaning there is no dead-end of flow between the mesopore in the inter yarn space and the micropore in the yarn. Several studies have employed the Brinkman equation to take into account the flow through dual-scale porosity reinforcement to estimate their permeability. Furthermore, to reduce the computational effort of dual scale flow, scale separation criteria based on the ratio between yarn permeability to the yarn spacing was also proposed to quantify the dual scale and negligible micro-scale flow regime for the prediction of mesoscale permeability. In the present work, the key parameter to identify the influence of intra yarn permeability on the mesoscale permeability has been investigated with the systematic study of weft and warp yarn spacing on the plane weave as well as the position of binder yarn and number of in-plane yarn layers on 3D weave fabric. The permeability tensor has been estimated using an OpenFOAM-based model for the various weave pattern with idealized geometry of yarn implemented using open-source software TexGen. Additionally, scale separation criterion has been established based on the various configuration of yarn permeability for the 3D fabric with both the isotropic and anisotropic yarn from Gebart’s model. It was observed that the variation of mesoscale permeability Kxx within 30% when the isotropic porous yarn is considered for a 3D fabric with binder yarn. Furthermore, the permeability model developed in this study will be used for multi-objective optimizations of the preform mesoscale geometry in terms of yarn spacing, binder pattern, and a number of layers with an aim to obtain improved permeability and reduced void content during the LCM process.Keywords: permeability, 3D fabric, dual-scale flow, liquid composite molding
Procedia PDF Downloads 961263 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure
Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh
Abstract:
Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability
Procedia PDF Downloads 2931262 Numerical Investigation of Natural Convection of Pine, Olive and Orange Leaves
Authors: Ali Reza Tahavvor, Saeed Hosseini, Nazli Jowkar, Behnam Amiri
Abstract:
Heat transfer of leaves is a crucial factor in optimal operation of metabolic functions in plants. In order to quantify this phenomenon in different leaves and investigate the influence of leaf shape on heat transfer, natural convection for pine, orange and olive leaves was simulated as representatives of different groups of leaf shapes. CFD techniques were used in this simulation with the purpose to calculate heat transfer of leaves in similar environmental conditions. The problem was simulated for steady state and three-dimensional conditions. From obtained results, it was concluded that heat fluxes of all three different leaves are almost identical, however, total rate of heat transfer have highest and lowest values for orange leaves and pine leaves, respectively.Keywords: computational fluid dynamic, heat flux, heat transfer, natural convection
Procedia PDF Downloads 3621261 A Numerical Simulation of Arterial Mass Transport in Presence of Magnetic Field-Links to Atherosclerosis
Authors: H. Aminfar, M. Mohammadpourfard, K. Khajeh
Abstract:
This paper has focused on the most important parameters in the LSC uptake; inlet Re number and Sc number in the presence of non-uniform magnetic field. The magnetic field is arising from the thin wire with electric current placed vertically to the arterial blood vessel. According to the results of this study, applying magnetic field can be a treatment for atherosclerosis by reducing LSC along the vessel wall. Homogeneous porous layer as a arterial wall has been regarded. Blood flow has been considered laminar and incompressible containing Ferro fluid (blood and 4 % vol. Fe₃O₄) under steady state conditions. Numerical solution of governing equations was obtained by using the single-phase model and control volume technique for flow field.Keywords: LDL surface concentration (LSC), magnetic field, computational fluid dynamics, porous wall
Procedia PDF Downloads 4081260 Secure Bio Semantic Computing Scheme
Authors: Hiroshi Yamaguchi, Phillip C. Y. Sheu, Ryo Fujita, Shigeo Tsujii
Abstract:
In this paper, the secure BioSemantic Scheme is presented to bridge biological/biomedical research problems and computational solutions via semantic computing. Due to the diversity of problems in various research fields, the semantic capability description language (SCDL) plays and important role as a common language and generic form for problem formalization. SCDL is expected the essential for future semantic and logical computing in Biosemantic field. We show several example to Biomedical problems in this paper. Moreover, in the coming age of cloud computing, the security problem is considered to be crucial issue and we presented a practical scheme to cope with this problem.Keywords: biomedical applications, private information retrieval (PIR), semantic capability description language (SCDL), semantic computing
Procedia PDF Downloads 3901259 Single Machine Scheduling Problem to Minimize the Number of Tardy Jobs
Authors: Ali Allahverdi, Harun Aydilek, Asiye Aydilek
Abstract:
Minimizing the number of tardy jobs is an important factor to consider while making scheduling decisions. This is because on-time shipments are vital for lowering cost and increasing customers’ satisfaction. This paper addresses the single machine scheduling problem with the objective of minimizing the number of tardy jobs. The only known information is the lower and upper bounds for processing times, and deterministic job due dates. A dominance relation is established, and an algorithm is proposed. Several heuristics are generated from the proposed algorithm. Computational analysis indicates that the performance of one of the heuristics is very close to the optimal solution, i.e., on average, less than 1.5 % from the optimal solution.Keywords: single machine scheduling, number of tardy jobs, heuristi, lower and upper bounds
Procedia PDF Downloads 5551258 A Hybrid LES-RANS Approach to Analyse Coupled Heat Transfer and Vortex Structures in Separated and Reattached Turbulent Flows
Authors: C. D. Ellis, H. Xia, X. Chen
Abstract:
Experimental and computational studies investigating heat transfer in separated flows have been of increasing importance over the last 60 years, as efforts are being made to understand and improve the efficiency of components such as combustors, turbines, heat exchangers, nuclear reactors and cooling channels. Understanding of not only the time-mean heat transfer properties but also the unsteady properties is vital for design of these components. As computational power increases, more sophisticated methods of modelling these flows become available for use. The hybrid LES-RANS approach has been applied to a blunt leading edge flat plate, utilising a structured grid at a moderate Reynolds number of 20300 based on the plate thickness. In the region close to the wall, the RANS method is implemented for two turbulence models; the one equation Spalart-Allmaras model and Menter’s two equation SST k-ω model. The LES region occupies the flow away from the wall and is formulated without any explicit subgrid scale LES modelling. Hybridisation is achieved between the two methods by the blending of the nearest wall distance. Validation of the flow was obtained by assessing the mean velocity profiles in comparison to similar studies. Identifying the vortex structures of the flow was obtained by utilising the λ2 criterion to identify vortex cores. The qualitative structure of the flow compared with experiments of similar Reynolds number. This identified the 2D roll up of the shear layer, breaking down via the Kelvin-Helmholtz instability. Through this instability the flow progressed into hairpin like structures, elongating as they advanced downstream. Proper Orthogonal Decomposition (POD) analysis has been performed on the full flow field and upon the surface temperature of the plate. As expected, the breakdown of POD modes for the full field revealed a relatively slow decay compared to the surface temperature field. Both POD fields identified the most energetic fluctuations occurred in the separated and recirculation region of the flow. Latter modes of the surface temperature identified these levels of fluctuations to dominate the time-mean region of maximum heat transfer and flow reattachment. In addition to the current research, work will be conducted in tracking the movement of the vortex cores and the location and magnitude of temperature hot spots upon the plate. This information will support the POD and statistical analysis performed to further identify qualitative relationships between the vortex dynamics and the response of the surface heat transfer.Keywords: heat transfer, hybrid LES-RANS, separated and reattached flow, vortex dynamics
Procedia PDF Downloads 2311257 Solid Particles Transport and Deposition Prediction in a Turbulent Impinging Jet Using the Lattice Boltzmann Method and a Probabilistic Model on GPU
Authors: Ali Abdul Kadhim, Fue Lien
Abstract:
Solid particle distribution on an impingement surface has been simulated utilizing a graphical processing unit (GPU). In-house computational fluid dynamics (CFD) code has been developed to investigate a 3D turbulent impinging jet using the lattice Boltzmann method (LBM) in conjunction with large eddy simulation (LES) and the multiple relaxation time (MRT) models. This paper proposed an improvement in the LBM-cellular automata (LBM-CA) probabilistic method. In the current model, the fluid flow utilizes the D3Q19 lattice, while the particle model employs the D3Q27 lattice. The particle numbers are defined at the same regular LBM nodes, and transport of particles from one node to its neighboring nodes are determined in accordance with the particle bulk density and velocity by considering all the external forces. The previous models distribute particles at each time step without considering the local velocity and the number of particles at each node. The present model overcomes the deficiencies of the previous LBM-CA models and, therefore, can better capture the dynamic interaction between particles and the surrounding turbulent flow field. Despite the increasing popularity of LBM-MRT-CA model in simulating complex multiphase fluid flows, this approach is still expensive in term of memory size and computational time required to perform 3D simulations. To improve the throughput of each simulation, a single GeForce GTX TITAN X GPU is used in the present work. The CUDA parallel programming platform and the CuRAND library are utilized to form an efficient LBM-CA algorithm. The methodology was first validated against a benchmark test case involving particle deposition on a square cylinder confined in a duct. The flow was unsteady and laminar at Re=200 (Re is the Reynolds number), and simulations were conducted for different Stokes numbers. The present LBM solutions agree well with other results available in the open literature. The GPU code was then used to simulate the particle transport and deposition in a turbulent impinging jet at Re=10,000. The simulations were conducted for L/D=2,4 and 6, where L is the nozzle-to-surface distance and D is the jet diameter. The effect of changing the Stokes number on the particle deposition profile was studied at different L/D ratios. For comparative studies, another in-house serial CPU code was also developed, coupling LBM with the classical Lagrangian particle dispersion model. Agreement between results obtained with LBM-CA and LBM-Lagrangian models and the experimental data is generally good. The present GPU approach achieves a speedup ratio of about 350 against the serial code running on a single CPU.Keywords: CUDA, GPU parallel programming, LES, lattice Boltzmann method, MRT, multi-phase flow, probabilistic model
Procedia PDF Downloads 2071256 Numerical Study of the Dynamic Behavior of an Air Conditioning with a Muti Confined Swirling Jet
Authors: Mohamed Roudane
Abstract:
The objective of this study is to know the dynamic behavior of a multi swirling jet used for air conditioning inside a room. To conduct this study, we designed a facility to ensure proper conditions of confinement in which we placed five air blowing devices with adjustable vanes, providing multiple swirling turbulent jets. The jets were issued in the same direction and the same spacing defined between them. This study concerned the numerical simulation of the dynamic mixing of confined swirling multi-jets, and examined the influence of important parameters of a swirl diffuser system on the dynamic performance characteristics. The CFD investigations are carried out by a hybrid mesh to discretize the computational domain. In this work, the simulations have been performed using the finite volume method and FLUENT solver, in which the standard k-ε RNG turbulence model was used for turbulence computations.Keywords: simulation, dynamic behavior, swirl, turbulent jet
Procedia PDF Downloads 3991255 CFD Simulation of Surge Wave Generated by Flow-Like Landslides
Authors: Liu-Chao Qiu
Abstract:
The damage caused by surge waves generated in water bodies by flow-like landslides can be very high in terms of human lives and economic losses. The complicated phenomena occurred in this highly unsteady process are difficult to model because three interacting phases: air, water and sediment are involved. The problem therefore is challenging since the effects of non-Newtonian fluid describing the rheology of the flow-like landslides, multi-phase flow and free surface have to be included in the simulation. In this work, the commercial computational fluid dynamics (CFD) package FLUENT is used to model the surge waves due to flow-like landslides. The comparison between the numerical results and experimental data reported in the literature confirms the accuracy of the method.Keywords: flow-like landslide, surge wave, VOF, non-Newtonian fluids, multi-phase flows, free surface flow
Procedia PDF Downloads 4161254 Economized Sensor Data Processing with Vehicle Platooning
Authors: Henry Hexmoor, Kailash Yelasani
Abstract:
We present vehicular platooning as a special case of crowd-sensing framework where sharing sensory information among a crowd is used for their collective benefit. After offering an abstract policy that governs processes involving a vehicular platoon, we review several common scenarios and components surrounding vehicular platooning. We then present a simulated prototype that illustrates efficiency of road usage and vehicle travel time derived from platooning. We have argued that one of the paramount benefits of platooning that is overlooked elsewhere, is the substantial computational savings (i.e., economizing benefits) in acquisition and processing of sensory data among vehicles sharing the road. The most capable vehicle can share data gathered from its sensors with nearby vehicles grouped into a platoon.Keywords: cloud network, collaboration, internet of things, social network
Procedia PDF Downloads 1941253 A Simulation Modeling Approach for Optimization of Storage Space Allocation in Container Terminal
Authors: Gamal Abd El-Nasser A. Said, El-Sayed M. El-Horbaty
Abstract:
Container handling problems at container terminals are NP-hard problems. This paper presents an approach using discrete-event simulation modeling to optimize solution for storage space allocation problem, taking into account all various interrelated container terminal handling activities. The proposed approach is applied on a real case study data of container terminal at Alexandria port. The computational results show the effectiveness of the proposed model for optimization of storage space allocation in container terminal where 54% reduction in containers handling time in port is achieved.Keywords: container terminal, discrete-event simulation, optimization, storage space allocation
Procedia PDF Downloads 3261252 Design Optimization and Thermoacoustic Analysis of Pulse Tube Cryocooler Components
Authors: K. Aravinth, C. T. Vignesh
Abstract:
The usage of pulse tube cryocoolers is significantly increased mainly due to the advantage of the absence of moving parts. The underlying idea of this project is to optimize the design of pulse tube, regenerator, a resonator in cryocooler and analyzing the thermo-acoustic oscillations with respect to the design parameters. Computational Fluid Dynamic (CFD) model with time-dependent validation is done to predict its performance. The continuity, momentum, and energy equations are solved for various porous media regions. The effect of changing the geometries and orientation will be validated and investigated in performance. The pressure, temperature and velocity fields in the regenerator and pulse tube are evaluated. This optimized design performance results will be compared with the existing pulse tube cryocooler design. The sinusoidal behavior of cryocooler in acoustic streaming patterns in pulse tube cryocooler will also be evaluated.Keywords: acoustics, cryogenics, design, optimization
Procedia PDF Downloads 1751251 Trajectory Planning Algorithms for Autonomous Agricultural Vehicles
Authors: Caner Koc, Dilara Gerdan Koc, Mustafa Vatandas
Abstract:
The fundamental components of autonomous agricultural robot design, such as having a working understanding of coordinates, correctly constructing the desired route, and sensing environmental elements, are the most important. A variety of sensors, hardware, and software are employed by agricultural robots to find these systems.These enable the fully automated driving system of an autonomous vehicle to simulate how a human-driven vehicle would respond to changing environmental conditions. To calculate the vehicle's motion trajectory using data from the sensors, this automation system typically consists of a sophisticated software architecture based on object detection and driving decisions. In this study, the software architecture of an autonomous agricultural vehicle is compared to the trajectory planning techniques.Keywords: agriculture 5.0, computational intelligence, motion planning, trajectory planning
Procedia PDF Downloads 781250 Multiscale Connected Component Labelling and Applications to Scientific Microscopy Image Processing
Authors: Yayun Hsu, Henry Horng-Shing Lu
Abstract:
In this paper, a new method is proposed to extending the method of connected component labeling from processing binary images to multi-scale modeling of images. By using the adaptive threshold of multi-scale attributes, this approach minimizes the possibility of missing those important components with weak intensities. In addition, the computational cost of this approach remains similar to that of the typical approach of component labeling. Then, this methodology is applied to grain boundary detection and Drosophila Brain-bow neuron segmentation. These demonstrate the feasibility of the proposed approach in the analysis of challenging microscopy images for scientific discovery.Keywords: microscopic image processing, scientific data mining, multi-scale modeling, data mining
Procedia PDF Downloads 4351249 Lexicon-Based Sentiment Analysis for Stock Movement Prediction
Authors: Zane Turner, Kevin Labille, Susan Gauch
Abstract:
Sentiment analysis is a broad and expanding field that aims to extract and classify opinions from textual data. Lexicon-based approaches are based on the use of a sentiment lexicon, i.e., a list of words each mapped to a sentiment score, to rate the sentiment of a text chunk. Our work focuses on predicting stock price change using a sentiment lexicon built from financial conference call logs. We present a method to generate a sentiment lexicon based upon an existing probabilistic approach. By using a domain-specific lexicon, we outperform traditional techniques and demonstrate that domain-specific sentiment lexicons provide higher accuracy than generic sentiment lexicons when predicting stock price change.Keywords: computational finance, sentiment analysis, sentiment lexicon, stock movement prediction
Procedia PDF Downloads 1271248 Lexicon-Based Sentiment Analysis for Stock Movement Prediction
Authors: Zane Turner, Kevin Labille, Susan Gauch
Abstract:
Sentiment analysis is a broad and expanding field that aims to extract and classify opinions from textual data. Lexicon-based approaches are based on the use of a sentiment lexicon, i.e., a list of words each mapped to a sentiment score, to rate the sentiment of a text chunk. Our work focuses on predicting stock price change using a sentiment lexicon built from financial conference call logs. We introduce a method to generate a sentiment lexicon based upon an existing probabilistic approach. By using a domain-specific lexicon, we outperform traditional techniques and demonstrate that domain-specific sentiment lexicons provide higher accuracy than generic sentiment lexicons when predicting stock price change.Keywords: computational finance, sentiment analysis, sentiment lexicon, stock movement prediction
Procedia PDF Downloads 1701247 An Optimal Bayesian Maintenance Policy for a Partially Observable System Subject to Two Failure Modes
Authors: Akram Khaleghei Ghosheh Balagh, Viliam Makis, Leila Jafari
Abstract:
In this paper, we present a new maintenance model for a partially observable system subject to two failure modes, namely a catastrophic failure and a failure due to the system degradation. The system is subject to condition monitoring and the degradation process is described by a hidden Markov model. A cost-optimal Bayesian control policy is developed for maintaining the system. The control problem is formulated in the semi-Markov decision process framework. An effective computational algorithm is developed and illustrated by a numerical example.Keywords: partially observable system, hidden Markov model, competing risks, multivariate Bayesian control
Procedia PDF Downloads 4571246 Magnetohydrodynamic Flows in a Misaligned Duct under a Uniform Magnetic Field
Authors: Mengqi Zhu, Chang Nyung Kim
Abstract:
This study numerically investigates three-dimensional liquid-metal (LM) magnetohydrodynamic (MHD) flows in a misaligned duct under a uniform magnetic field. The duct consists of two misaligned horizontal channels (one is inflow channel, the other is outflow channel) and one central vertical channel. Computational fluid dynamics simulations are performed to predict the behavior of the MHD flows, using commercial code CFX. In the current study, a case with Hartmann number 1000 is considered. The electromagnetic features of LM MHD flows are elucidated to examine the interdependency of the flow velocity, current density, electric potential, pressure drop and Lorentz force. The results show that pressure decreases linearly along the main flow direction.Keywords: CFX, liquid-metal magnetohydrodynamic flows, misaligned duct, pressure drop
Procedia PDF Downloads 2841245 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve
Authors: Eun-Jun Yoon
Abstract:
Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis
Procedia PDF Downloads 3321244 Fluid Flow in Roughened Square Tube for Internal Blade Cooling
Authors: M. H. Alhajeri, Hamad M. Alhajeri, A. H. Alenezi, Abdulrahman Almutairi, Ayedh Alajmi
Abstract:
A computational investigation has been undertaken to study fluid flow through roughened tube with turbulators. Such flows are of particular interest in cooling internally high pressure turbine blades. Turbulators are fixed in each side of the passage (tube) to promote turbulence and enhance heat transfer. The tube had an aspect ratio of 1 and the position of the ribs closest to the bend are at 0.45d from the entrance and exit of the bend. The aim of this study is to examine the tube roughened by turbulator by studying some flow parameters upstream and downstream of the turbulator. It is cleared that the eddies sizes are decreased downstream in the first two turbulators and increased after the turbulators increases the turbulence in the tube and enhanced the heat transfer in the blade.Keywords: fluid flow, turbulator, computation, blade
Procedia PDF Downloads 4271243 Computational Fluid Dynamics Analysis of an RC Airplane Wing Using a NACA 2412 Profile at Different Angle of Attacks
Authors: Huseyin Gokberk, Shian Gao
Abstract:
CFD analysis of the relationship between the coefficients of lift and drag with respect to the angle of attack on a NACA 2412 wing section of an RC plane is conducted. Both the 2D and 3D models are investigated with the turbulence model. The 2D analysis has a free stream velocity of 10m/s at different AoA of 0°, 2°, 5°, 10°, 12°, and 15°. The induced drag and drag coefficient increased throughout the changes in angles even after the critical angle had been exceeded, whereas the lift force and coefficient of lift increased but had a limit at the critical stall angle, which results in values to reduce sharply. Turbulence flow characteristics are analysed around the aerofoil with the additions caused due to a finite 3D model. 3D results highlight how wing tip vortexes develop and alter the flow around the wing with the effects of the tapered configuration.Keywords: CFD, turbulence modelling, aerofoil, angle of attack
Procedia PDF Downloads 2251242 MHD Flow in a Curved Duct with FCI under a Uniform Magnetic Field
Authors: Yue Yan, Chang Nyung Kim
Abstract:
The numerical investigation of the three-dimensional liquid-metal (LM) magnetohydrodynamic (MHD) flows in a curved duct with flow channel insert (FCI) is presented in this paper, based on the computational fluid dynamics (CFD) method. A uniform magnetic field is applied perpendicular to the duct. The interdependency of the flow variables is examined in terms of the flow velocity, current density, electric potential and pressure. The electromagnetic characteristics of the LM MHD flows are reviewed with an introduction of the electric-field component and electro-motive component of the current. The influence of the existence of the FCI on the fluid flow is investigated in detail. The case with FCI slit located near the side layer yields smaller pressure gradient with stable flow field.Keywords: curved duct, flow channel insert, liquid-metal, magnetohydrodynamic
Procedia PDF Downloads 4961241 Investigation of Soot Regeneration Behavior in the DPF Cleaning Device
Authors: Won Jun Jo, Man Young Kim
Abstract:
To meet stringent diesel particulate matter regulations, DPF system is essential after treatment technology providing exceptional reliability and filtration performance. At low load driving conditions, the passive type of DPF system is ineffective for regeneration method due to the inadequate of engine exhaust heat in removing accumulated soot from the filter. Therefore, DPF cleaning device is necessary to remove the soot particles. In this work, the numerical analysis on the active regeneration of DPF in DPF cleaning device is performed to find the optimum operating conditions. In order to find the DPF regeneration characteristics during active regeneration, 5 different initial soot loading condition are investigated. As the initial soot mass increases, the maximum temperature of DPF and regeneration rate also increase.Keywords: active regeneration, DPF cleaning device, pressure drop, Diesel Particulate Filter, particulate matters, computational fluid dynamics
Procedia PDF Downloads 2931240 Heat Transfer Performance for Turbulent Flow through a Tube Using Baffles
Authors: Amina Benabderrahmane, Abdelylah Benazza, Samir Laouedj
Abstract:
Three dimensional numerical investigation of heat transfer enhancement inside a non-uniformly heated parabolic trough solar collector fitted with baffles under turbulent flow was studied in the current paper. Molten salt is used as heat transfer fluid and simulations are carried out in ANSYS computational fluid dynamics (CFD). The present data was validating by the empirical correlations available in the literatures and good agreement was obtained. The Nusselt number and friction factor values for using baffles are considerably higher than that for smooth pipe. The emplacement and the distance between two consecutive baffles have an effect non-negligible on heat transfer characteristics; the results demonstrate that the temperature gradient reduces with the inclusion of inserts.Keywords: Baffles, heat transfer enhancement, molten salt, Monte Carlo ray trace technique, numerical investigation
Procedia PDF Downloads 3001239 Computational Fluid Dynamics (CFD) Calculations of the Wind Turbine with an Adjustable Working Surface
Authors: Zdzislaw Kaminski, Zbigniew Czyz, Krzysztof Skiba
Abstract:
This paper discusses the CFD simulation of a flow around a rotor of a Vertical Axis Wind Turbine. Numerical simulation, unlike experiments, enables us to validate project assumptions when it is designed and avoid a costly preparation of a model or a prototype for a bench test. CFD simulation enables us to compare characteristics of aerodynamic forces acting on rotor working surfaces and define operational parameters like torque or power generated by a turbine assembly. This research focused on the rotor with the blades capable of modifying their working surfaces, i.e. absorbing wind kinetic energy. The operation of this rotor is based on adjusting angular aperture α of the top and bottom parts of the blades mounted on an axis. If this angular aperture α increases, the working surface which absorbs wind kinetic energy also increases. The operation of turbines is characterized by parameters like the angular aperture of blades, power, torque, speed for a given wind speed. These parameters have an impact on the efficiency of assemblies. The distribution of forces acting on the working surfaces in our turbine changes according to the angular velocity of the rotor. Moreover, the resultant force from the force acting on an advancing blade and retreating blade should be as high as possible. This paper is part of the research to improve an efficiency of a rotor assembly. Therefore, using simulation, the courses of the above parameters were studied in three full rotations individually for each of the blades for three angular apertures of blade working surfaces, i.e. 30 °, 60 °, 90 °, at three wind speeds, i.e. 4 m / s, 6 m / s, 8 m / s and rotor speeds ranging from 100 to 500 rpm. Finally, there were created the characteristics of torque coefficients and power as a function of time for each blade separately and for the entire rotor. Accordingly, the correlation between the turbine rotor power as a function of wind speed for varied values of rotor rotational speed. By processing this data, the correlation between the power of the turbine rotor and its rotational speed for each of the angular aperture of the working surfaces was specified. Finally, the optimal values, i.e. of the highest output power for given wind speeds were read. The research results in receiving the basic characteristics of turbine rotor power as a function of wind speed for the three angular apertures of the blades. Given the nature of rotor operation, the growth in the output turbine can be estimated if angular aperture of the blades increases. The controlled adjustment of angle α enables a smooth adjustment of power generated by a turbine rotor. If wind speed is significant, this type of adjustment enables this output power to remain at the same level (by reducing angle α) with no risk of damaging a construction. This work has been financed by the Polish Ministry of Science and Higher Education.Keywords: computational fluid dynamics, numerical analysis, renewable energy, wind turbine
Procedia PDF Downloads 2171238 Numerical Study of an Impinging Jet in a Coflow Stream
Authors: Rim Ben Kalifa, Sabra Habli, Nejla Mahjoub Saïd, Hervé Bournot, Georges Le Palec
Abstract:
The present study treats different phenomena taking place in a configuration of air jet impinging on a flat surface in a coflow stream. A Computational Fluid Dynamics study is performed using the Reynolds-averaged Navier–Stokes equations by means of the Reynolds Stress Model (RSM) second order turbulent closure model. The results include mean and turbulent velocities and quantify the large effects of the coflow stream on an impinging air jet. The study of the jet in a no-directed coflow stream shows the presence of a phenomenon of recirculation near the flat plate. The influence of the coflow velocity ratio on the behavior of an impinging plane jet was also numerically investigated. The coflow stream imposed noticeable restrictions on the spreading of the impinging jet. The results show that the coflow stream decreases considerably the entrainment of air jet.Keywords: turbulent jet, turbulence models, coflow stream, velocity ratio
Procedia PDF Downloads 2381237 Improved Impossible Differential Cryptanalysis of Midori64
Authors: Zhan Chen, Wenquan Bi, Xiaoyun Wang
Abstract:
The Midori family of light weight block cipher is proposed in ASIACRYPT2015. It has attracted the attention of numerous cryptanalysts. There are two versions of Midori: Midori64 which takes a 64-bit block size and Midori128 the size of which is 128-bit. In this paper an improved 10-round impossible differential attack on Midori64 is proposed. Pre-whitening keys are considered in this attack. A better impossible differential path is used to reduce time complexity by decreasing the number of key bits guessed. A hash table is built in the pre-computation phase to reduce computational complexity. Partial abort technique is used in the key seiving phase. The attack requires 259 chosen plaintexts, 214.58 blocks of memory and 268.83 10-round Midori64 encryptions.Keywords: cryptanalysis, impossible differential, light weight block cipher, Midori
Procedia PDF Downloads 3481236 Analysis of Various Copy Move Image Forgery Techniques for Better Detection Accuracy
Authors: Grishma D. Solanki, Karshan Kandoriya
Abstract:
In modern era of information age, digitalization has revolutionized like never before. Powerful computers, advanced photo editing software packages and high resolution capturing devices have made manipulation of digital images incredibly easy. As per as image forensics concerns, one of the most actively researched area are detection of copy move forgeries. Higher computational complexity is one of the major component of existing techniques to detect such tampering. Moreover, copy move forgery is usually performed in three steps. First, copying of a region in an image then pasting the same one in the same respective image and finally doing some post-processing like rotation, scaling, shift, noise, etc. Consequently, pseudo Zernike moment is used as a features extraction method for matching image blocks and as a primary factor on which performance of detection algorithms depends.Keywords: copy-move image forgery, digital forensics, image forensics, image forgery
Procedia PDF Downloads 288