Search results for: Haydar Kepekçi
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6

Search results for: Haydar Kepekçi

6 Aeroacoustics Investigations of Unsteady 3D Airfoil for Different Angle Using Computational Fluid Dynamics Software

Authors: Haydar Kepekçi, Baha Zafer, Hasan Rıza Güven

Abstract:

Noise disturbance is one of the major factors considered in the fast development of aircraft technology. This paper reviews the flow field, which is examined on the 2D NACA0015 and 3D NACA0012 blade profile using SST k-ω turbulence model to compute the unsteady flow field. We inserted the time-dependent flow area variables in Ffowcs-Williams and Hawkings (FW-H) equations as an input and Sound Pressure Level (SPL) values will be computed for different angles of attack (AoA) from the microphone which is positioned in the computational domain to investigate effect of augmentation of unsteady 2D and 3D airfoil region noise level. The computed results will be compared with experimental data which are available in the open literature. As results; one of the calculated Cp is slightly lower than the experimental value. This difference could be due to the higher Reynolds number of the experimental data. The ANSYS Fluent software was used in this study. Fluent includes well-validated physical modeling capabilities to deliver fast, accurate results across the widest range of CFD and multiphysics applications. This paper includes a study which is on external flow over an airfoil. The case of 2D NACA0015 has approximately 7 million elements and solves compressible fluid flow with heat transfer using the SST turbulence model. The other case of 3D NACA0012 has approximately 3 million elements.

Keywords: 3D blade profile, noise disturbance, aeroacoustics, Ffowcs-Williams and Hawkings (FW-H) equations, k-ω-SST turbulence model

Procedia PDF Downloads 175
5 Cybersecurity Awareness through Laboratories and Cyber Competitions in the Education System: Practices to Promote Student Success

Authors: Haydar Teymourlouei

Abstract:

Cybersecurity is one of the greatest challenges society faces in an age revolving around technological development. With cyber-attacks on the continuous rise, the nation needs to understand and learn ways that can prevent such attacks. A major contribution that can change the education system is to implement laboratories and competitions into academia. This method can improve and educate students with more hands-on exercises in a highly motivating setting. Considering the fact that students are the next generation of the nation’s workforce, it is important for students to understand concepts not only through books, but also through actual hands-on experiences in order for them to be prepared for the workforce. An effective cybersecurity education system is critical for creating a strong cyber secure workforce today and for the future. This paper emphasizes the need for awareness and the need for competitions and cybersecurity laboratories to be implemented into the education system.

Keywords: awareness, competition, cybersecurity, laboratories, workforce

Procedia PDF Downloads 297
4 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: cyber-attacks, home user, prevention, security, technology

Procedia PDF Downloads 358
3 A Monte Carlo Fuzzy Logistic Regression Framework against Imbalance and Separation

Authors: Georgios Charizanos, Haydar Demirhan, Duygu Icen

Abstract:

Two of the most impactful issues in classical logistic regression are class imbalance and complete separation. These can result in model predictions heavily leaning towards the imbalanced class on the binary response variable or over-fitting issues. Fuzzy methodology offers key solutions for handling these problems. However, most studies propose the transformation of the binary responses into a continuous format limited within [0,1]. This is called the possibilistic approach within fuzzy logistic regression. Following this approach is more aligned with straightforward regression since a logit-link function is not utilized, and fuzzy probabilities are not generated. In contrast, we propose a method of fuzzifying binary response variables that allows for the use of the logit-link function; hence, a probabilistic fuzzy logistic regression model with the Monte Carlo method. The fuzzy probabilities are then classified by selecting a fuzzy threshold. Different combinations of fuzzy and crisp input, output, and coefficients are explored, aiming to understand which of these perform better under different conditions of imbalance and separation. We conduct numerical experiments using both synthetic and real datasets to demonstrate the performance of the fuzzy logistic regression framework against seven crisp machine learning methods. The proposed framework shows better performance irrespective of the degree of imbalance and presence of separation in the data, while the considered machine learning methods are significantly impacted.

Keywords: fuzzy logistic regression, fuzzy, logistic, machine learning

Procedia PDF Downloads 30
2 Production of Metal Matrix Composites with Diamond for Abrasive Cutting Resistance by Gas Infiltration Casting

Authors: Haydar S. Al Shabbani, M. Marshall, R. Goodall

Abstract:

Metal matrix composites (MMCs) have been explored for many applications for many decades. Recently, this includes investigations for thermal applications associated with electronics, such as in heat sinks. Here, to promote thermal conductivity, composites of a metal matrix with diamond particles are used. However, this class of composites has not yet been extensively examined for mechanical and tribological behavior, especially for applications that require extreme mechanical and tribological strength, such as the resistance to abrasive cutting. Therefore, this research seeks to develop a composite material with metal matrix and diamond particles which resist abrasive and cutting forces. The development progresses through a series of steps, exploring methods to process the material, understanding the mechanics of abrasive behavior and optimizing the composite structure to resist abrasive cutting. In processing, infiltration casting under gas pressure has been applied to molten aluminum to obtain a significant penetration of the metal into a preform of diamond particles. Different diamond particle sizes were used with different surface modifications (coated/uncoated), and to compare resulting composites with the same particle sizes. Al-1 wt.% Mg as a matrix alloy was utilised to investigate the possible effect of Mg on bonding phases during the infiltration process. The mechanical behavior and microstructure of the materials produced have been characterised. These tests showed that the surface modification of the diamond particles with a reactive material (Ti-coating) has an important role for enhancing the bonding between the aluminium matrix and diamond reinforcement as apparent under SEM observation. The effect of this improved bond is seen in the cutting resistance of the material.

Keywords: aluminium, composites, diamond, Ti-coated, tribology

Procedia PDF Downloads 235
1 Molecular Electron Density Theory Study on the Mechanism and Selectivity of the 1,3 Dipolar Cycloaddition Reaction of N-Methyl-C-(2-Furyl) Nitrone with Activated Alkenes

Authors: Moulay Driss Mellaoui, Abdallah Imjjad, Rachid Boutiddar, Haydar Mohammad-Salim, Nivedita Acharjee, Hassan Bourzi, Souad El Issami, Khalid Abbiche, Hanane Zejli

Abstract:

We have investigated the underlying molecular processes involved in the [3+2] cycloaddition (32CA) reactions between N-methyl-C-(2-furyl) nitrone and three acetylene derivatives: 4b, 5b, and 6b. For this investigation, we utilized molecular electron density theory (MEDT) and density functional theory (DFT) methods at the B3LYP-D3/6 31G (d) computational level. These 32CA reactions, which exhibit a zwitterionic (zw-type) nature, proceed through a one-step mechanism with activation enthalpies ranging from 8.80 to 14.37 kcal mol−1 in acetonitrile and ethanol solvents. When the nitrone reacts with phenyl methyl propiolate (4b), two regioisomeric pathways lead to the formation of two products: P1,5-4b and P1,4-4b. On the other hand, when the nitrone reacts with dimethyl acetylene dicarboxylate (5b) and acetylene dicarboxylic acid (but-2-ynedioic acid) (6b), it results in the formation of a single product. Through topological analysis, we can categorize the nitrone as a zwitterionic three-atom component (TAC). Furthermore, the analysis of conceptual density functional theory (CDFT) indices classifies the 32CA reactions of the nitrone with 4b, 5b, and 6b as forward electron density flux (FEDF) reactions. The study of bond evolution theory (BET) reveals that the formation of new C-C and C-O covalent bonds does not initiate in the transition states, as the intermediate stages of these reactions display pseudoradical centers of the atoms already involved in bonding.

Keywords: 4-isoxazoline, DFT/B3LYP-D3, regioselectivity, cycloaddition reaction, MEDT, ELF

Procedia PDF Downloads 127