Search results for: flat roof security wall
1747 Hygric Performance of a Sandstone Wall Retrofitted with Interior Thermal Insulation
Authors: J. Maděra, M. Jerman, R. Černý
Abstract:
Temperature, relative humidity and overhygroscopic moisture fields in a sandstone wall provided with interior thermal insulation were calculated in order to assess the hygric performance of the retrofitted wall. Computational simulations showed that during the time period of 10 years which was subject of investigation no overhygroscopic moisture appeared in the analyzed building envelope so that it performed in a satisfactory way from the hygric point of view.Keywords: Sandstone wall, interior thermal insulation, moisture, computational modeling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15391746 Security of Internet of Things: Challenges, Requirements and Future Directions
Authors: Amjad F. Alharbi, Bashayer A. Alotaibi, Fahd S. Alotaibi
Abstract:
The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted.Keywords: Internet of Things, IoT, IoT security challenges, IoT security requirements, IoT security architecture.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12021745 Structural Optimization Method for 3D Reinforced Concrete Building Structure with Shear Wall
Authors: H. Nikzad, S. Yoshitomi
Abstract:
In this paper, an optimization procedure is applied for 3D Reinforced concrete building structure with shear wall. In the optimization problem, cross sections of beams, columns and shear wall dimensions are considered as design variables and the optimal cross sections can be derived to minimize the total cost of the structure. As for final design application, the most suitable sections are selected to satisfy ACI 318-14 code provision based on static linear analysis. The validity of the method is examined through numerical example of 15 storied 3D RC building with shear wall. This optimization method is expected to assist in providing a useful reference in design early stage, and to be an effective and powerful tool for structural design of RC shear wall structures.
Keywords: Structural optimization, linear static analysis, ETABS, MATLAB, RC moment frame, RC shear wall structures.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13431744 Historical Development of Bagh-e Dasht in Herat, Afghanistan: A Comprehensive Field Survey of Physical and Social Aspects
Authors: Khojesta Kawish, Tetsuya Ando, Sayed Abdul Basir Samimi
Abstract:
Bagh-e Dasht area is situated in the northern part of Herat, an old city in western Afghanistan located on the Silk Road which has received a strong influence from Persian culture. Initially, the Bagh-e Dasht area was developed for gardens and palaces near Joy-e Injil canal during the Timurid Empire in the 15th century. It is assumed Bagh-e Dasht became a settlement in the 16th century during the Safavid Empire. The oldest area is the southern part around the canal bank which is characterized by Dalans, sun-dried brick arcades above which houses are often constructed. Traditional houses in this area are built with domical vault roofs constructed with sun-dried bricks. Bagh-e Dasht is one of the best-preserved settlements of traditional houses in Herat. This study examines the transformation of the Bagh-e Dasht area with a focus on Dalans, where traditional houses with domical vault roofs have been well-preserved until today. The aim of the study is to examine the extent of physical changes to the area as well as changes to houses and the community. This research paper contains original results which have previously not been published in architectural history. The roof types of houses in the area are investigated through examining high resolution satellite images. The boundary of each building and space is determined by both a field survey and aerial photographs of the study area. A comprehensive field survey was then conducted to examine each space and building in the area. In addition, a questionnaire was distributed to the residents of the Dalan houses and interviews were conducted with the Wakil (Chief) of the area, a local historian, residents and traditional builders. The study finds that the oldest part of Bagh-e Dasht area, the south, contains both Dalans and domical vault roof houses. The next oldest part, which is the north, only has domical vault roof houses. The rest of the area only has houses with modernized flat roofs. This observation provides an insight into the process of historical development in the Bagh-e Dasht area.
Keywords: Afghanistan, Bagh-e Dasht, Dalan, Domical vault, Herat, over path house, traditional house.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9251743 Design and Analysis of MEMS based Accelerometer for Automatic Detection of Railway Wheel Flat
Authors: Rajib Ul Alam Uzzal, Ion Stiharu, Waiz Ahmed
Abstract:
This paper presents the modeling of a MEMS based accelerometer in order to detect the presence of a wheel flat in the railway vehicle. A haversine wheel flat is assigned to one wheel of a 5 DOF pitch plane vehicle model, which is coupled to a 3 layer track model. Based on the simulated acceleration response obtained from the vehicle-track model, an accelerometer is designed that meets all the requirements to detect the presence of a wheel flat. The proposed accelerometer can survive in a dynamic shocking environment with acceleration up to ±150g. The parameters of the accelerometer are calculated in order to achieve the required specifications using lumped element approximation and the results are used for initial design layout. A finite element analysis code (COMSOL) is used to perform simulations of the accelerometer under various operating conditions and to determine the optimum configuration. The simulated results are found within about 2% of the calculated values, which indicates the validity of lumped element approach. The stability of the accelerometer is also determined in the desired range of operation including the condition under shock.
Keywords: MEMS accelerometer, Pitch plane vehicle, wheel flat.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 30721742 Experimental Measurements of Evacuated Enclosure Thermal Insulation Effectiveness for Vacuum Flat Plate Solar Thermal Collectors
Authors: Paul Henshall, Philip Eames, Roger Moss, Stan Shire, Farid Arya, Trevor Hyde
Abstract:
Encapsulating the absorber of a flat plate solar thermal collector in vacuum by an enclosure that can be evacuated can result in a significant increase in collector performance and achievable operating temperatures. This is a result of the thermal insulation effectiveness of the vacuum layer surrounding the absorber, as less heat is lost during collector operation. This work describes experimental thermal insulation characterization tests of prototype vacuum flat plate solar thermal collectors that demonstrate the improvement in absorber heat loss coefficients. Furthermore, this work describes the selection and sizing of a getter, suitable for maintaining the vacuum inside the enclosure for the lifetime of the collector, which can be activated at low temperatures.
Keywords: Vacuum, thermal, flat-plate solar collector.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16291741 Parametric Study of Confined Turbulent Impinging Slot Jets upon a Flat Plate
Authors: A. M. Tahsini, S. Tadayon Mousavi
Abstract:
In the present paper, a numerical investigation has been carried out to classify and clarify the effects of paramount parameters on turbulent impinging slot jets. The effects of nozzle-s exit turbulent intensity, distance between nozzle and impinging plate are studied at Reynolds number 5000 and 20000. In addition, the effect of Mach number that is varied between 0.3-0.8 at a constant Reynolds number 133000 is investigated to elucidate the effect of compressibility in impinging jet upon a flat plate. The wall that is located at the same level with nozzle-s exit confines the flow. A compressible finite volume solver is implemented for simulation the flow behavior. One equation Spalart-Allmaras turbulent model is used to simulate turbulent flow at this study. Assessment of the Spalart-Allmaras turbulent model at high nozzle to plate distance, and giving enough insights to characterize the effect of Mach number at high Reynolds number for the complex impinging jet flow are the remarkable results of this study.Keywords: Impinging jet, Numerical simulation, Turbulence.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24741740 Systems and Software Safety and Security
Authors: Marzieh Mokhtaripour
Abstract:
Security issue and the importance of the function of police to provide practical and psychological contexts in the community has been the main topics among researchers , police and security circles and this subject require to review and analysis mechanisms within the police and its interaction with other parts of the system for providing community safety. This paper examine national and social security in the Internet.Keywords: Internet National security Social security
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12651739 Relative Injective Modules and Relative Flat Modules
Authors: Jianmin Xing, Rufeng Xing
Abstract:
Let R be a ring, n a fixed nonnegative integer. The concepts of (n, 0)-FI-injective and (n, 0)-FI-flat modules, and then give some characterizations of these modules over left n-coherent rings are introduced . In addition, we investigate the left and right n-FI-resolutions of R-modules by left (right) derived functors Extn(−,−) (Torn(−,−) ) over a left n-coherent ring, where n-FI stands for the categories of all (n, 0)- injective left R-modules. These modules together with the left or right derived functors are used to study the (n, 0)-injective dimensions of modules and rings.
Keywords: (n, 0)-injective module, (n, 0)-injective dimension, (n, 0)-FI-injective(flat) module, (Pre)cover, (Pre)envelope.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18961738 Experimental Performance and Numerical Simulation of Double Glass Wall
Authors: Thana Ananacha
Abstract:
This paper reports the numerical and experimental performances of Double Glass Wall are investigated. Two configurations were considered namely, the Double Clear Glass Wall (DCGW) and the Double Translucent Glass Wall (DTGW). The coupled governing equations as well as boundary conditions are solved using the finite element method (FEM) via COMSOLTM Multiphysics. Temperature profiles and flow field of the DCGW and DTGW are reported and discussed. Different constant heat fluxes were considered as 400 and 800 W.m-2 the corresponding initial condition temperatures were 30.5 and 38.5ºC respectively. The results show that the simulation results are in agreement with the experimental data. Conclusively, the model considered in this study could reasonable be used simulate the thermal and ventilation performance of the DCGW and DTGW configurations.
Keywords: Thermal simulation, Double Glass Wall, Velocity field.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20941737 Seismic Behavior of Thin Shear Wall under the Exerted Loads
Authors: Ali A. Ofoghi
Abstract:
While the shear walls are not economical in buildings, thin shear walls are widely used in the buildings. In the present study, the ratio of different loads to their plasticity and seismic behavior of the wall under different loads have been investigated. Modeling and analysis are carried out by the finite element analysis software ABAQUS. The results show that any increase in the exerted loads will have adverse effects on the seismic behavior of the thin shear walls and causes the wall to collapse by small displacements.Keywords: Thin shear wall, nonlinear dynamic analysis, reinforced concrete, plasticity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9461736 A Novel Security Framework for the Web System
Authors: J. P. Dubois, P. G. Jreije
Abstract:
In this paper, a framework is presented trying to make the most secure web system out of the available generic and web security technology which can be used as a guideline for organizations building their web sites. The framework is designed to provide necessary security services, to address the known security threats, and to provide some cover to other security problems especially unknown threats. The requirements for the design are discussed which guided us to the design of secure web system. The designed security framework is then simulated and various quality of service (QoS) metrics are calculated to measure the performance of this system.Keywords: Web Security, Internet Voting, Firewall, QoS, Latency, Utilization, Throughput.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13431735 Wall Heat Flux Mapping in Liquid Rocket Combustion Chamber with Different Jet Impingement Angles
Authors: O. S. Pradeep, S. Vigneshwaran, K. Praveen Kumar, K. Jeyendran, V. R. Sanal Kumar
Abstract:
The influence of injector attitude on wall heat flux plays an important role in predicting the start-up transient and also determining the combustion chamber wall durability of liquid rockets. In this paper comprehensive numerical studies have been carried out on an idealized liquid rocket combustion chamber to examine the transient wall heat flux during its start-up transient at different injector attitude. Numerical simulations have been carried out with the help of a validated 2d axisymmetric, double precision, pressure-based, transient, species transport, SST k-omega model with laminar finite rate model for governing turbulent-chemistry interaction for four cases with different jet intersection angles, viz., 0o, 30o, 45o, and 60o. We concluded that the jets intersection angle is having a bearing on the time and location of the maximum wall-heat flux zone of the liquid rocket combustion chamber during the start-up transient. We also concluded that the wall heat flux mapping in liquid rocket combustion chamber during the start-up transient is a meaningful objective for the chamber wall material selection and the lucrative design optimization of the combustion chamber for improving the payload capability of the rocket.Keywords: Combustion chamber, injector, liquid rocket, rocket engine wall heat flux.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15021734 Institutional Aspects of Information Security in Russian Economy
Authors: Mingaleva Zhanna, Kapuskina Tatiana
Abstract:
The article touches upon questions of information security in Russian Economy. It covers theoretical bases of information security and causes of its development. The theory is proved by the analysis of business activities and the main tendencies of information security development. Perm region has been chosen as the bases for the analysis, being the fastestdeveloping region that uses methods of information security in managing it economy. As a result of the study the authors of the given article have formulated their own vision of the problem of information security in various branches of economy and stated prospects of information security development and its growing role in Russian economy
Keywords: security of business, management of information security, institutional analyses.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13181733 Wind Fragility for Soundproof Wall with the Variation of Section Shape of Frame
Authors: Seong Do Kim, Woo Young Jung
Abstract:
Recently, damages due to typhoons and strong wind are on the rise. Considering this issue, we evaluated the performance of soundproofing walls based on the strong wind fragility by means of numerical analysis. Among the components of the soundproof wall, aluminum frame was the most vulnerable member, thus we have considered different section of aluminum frame in the determination of wind fragility. Wind load was randomly generated using Monte Carlo Simulation method. Moreover, limit state was based on the test standard of road construction soundproofing wall. In this study, the strong wind fragility was determined by considering the influence factors of wind exposure category, soundproof wall’s installation position, and shape of aluminum frame section. Results of this study could be used to determine the section shape of the frame that has high resistance to the wind during construction of the soundproofing wall.
Keywords: Aluminum frame soundproofing wall, Monte Carlo Simulation, numerical simulation, wind fragility.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8881732 Combination of Information Security Standards to Cover National Requirements
Authors: Sh. Ladan, A. Yari, H. Khodabandeh
Abstract:
The need for Information Security in organizations, regardless of their type and size, is being addressed by emerging standards and recommended best practices. The various standards and practices which evolved in recent years and are still being developed and constantly revised, address the issue of Information Security from different angles. This paper attempts to provide an overview of Information Security Standards and Practices by briefly discussing some of the most popular ones. Through a comparative study of their similarities and differences, some insight can be obtained on how their combination may lead to an increased level of Information Security.
Keywords: Information security management, information security standard, BS7799, ISO 17799, COBIT.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15531731 Electrical and Thermal Characteristics of a Photovoltaic Solar Wall with Passive and Active Ventilation through a Room
Authors: Himanshu Dehra
Abstract:
An experimental study was conducted for ascertaining electrical and thermal characteristics of a pair of photovoltaic (PV) modules integrated with solar wall of an outdoor room. A pre-fabricated outdoor room was setup for conducting outdoor experiments on a PV solar wall with passive and active ventilation through the outdoor room. The selective operating conditions for glass coated PV modules were utilized for establishing their electrical and thermal characteristics. The PV solar wall was made up of glass coated PV modules, a ventilated air column, and an insulating layer of polystyrene filled plywood board. The measurements collected were currents, voltages, electric power, air velocities, temperatures, solar intensities, and thermal time constant. The results have demonstrated that: i) a PV solar wall installed on a wooden frame was of more heat generating capacity in comparison to a window glass or a standalone PV module; ii) generation of electric power was affected with operation of vertical PV solar wall; iii) electrical and thermal characteristics were not significantly affected by heat and thermal storage losses; and iv) combined heat and electricity generation were function of volume of thermal and electrical resistances developed across PV solar wall. Finally, a comparison of temperature plots of passive and active ventilation envisaged that fan pressure was necessary to avoid overheating of the PV solar wall. The active ventilation was necessary to avoid over-heating of the PV solar wall and to maintain adequate ventilation of room under mild climate conditions.
Keywords: Photovoltaic solar wall, solar energy, passive ventilation, active ventilation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12651730 A Formal Implementation of Database Security
Authors: Yun Bai
Abstract:
This paper is to investigate the impplementation of security mechanism in object oriented database system. Formal methods plays an essential role in computer security due to its powerful expressiveness and concise syntax and semantics. In this paper, both issues of specification and implementation in database security environment will be considered; and the database security is achieved through the development of an efficient implementation of the specification without compromising its originality and expressiveness.Keywords: database security, authorization policy, logic basedspecification
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17171729 Modelling of Powered Roof Supports Work
Authors: Marcin Michalak
Abstract:
Due to the increasing efforts on saving our natural environment a change in the structure of energy resources can be observed - an increasing fraction of a renewable energy sources. In many countries traditional underground coal mining loses its significance but there are still countries, like Poland or Germany, in which the coal based technologies have the greatest fraction in a total energy production. This necessitates to make an effort to limit the costs and negative effects of underground coal mining. The longwall complex is as essential part of the underground coal mining. The safety and the effectiveness of the work is strongly dependent of the diagnostic state of powered roof supports. The building of a useful and reliable diagnostic system requires a lot of data. As the acquisition of a data of any possible operating conditions it is important to have a possibility to generate a demanded artificial working characteristics. In this paper a new approach of modelling a leg pressure in the single unit of powered roof support. The model is a result of the analysis of a typical working cycles.Keywords: Machine modelling, underground mining, coal mining.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19251728 A Parametric Assessment of Friction Damper in Eccentric Braced Frame
Authors: J. Vaseghi, S.Navaei, B. Navayinia, F. Roshantabari
Abstract:
In This paper, the behavior of eccentric braced frame (EBF) is studied with replacing friction damper (FD) in confluence of these braces, in 5 and 10-storey steel frames. For FD system, the main step is to determine the slip load. For this reason, the performance indexes include roof displacement, base shear, dissipated energy and relative performance should be investigated. In nonlinear dynamic analysis, the response of structure to three earthquake records has been obtained and the values of roof displacement, base shear and column axial force for FD and EBF frames have been compared. The results demonstrate that use of the FD in frames, in comparison with the EBF, substantially reduces the roof displacement, column axial force and base shear. The obtained results show suitable performance of FD in higher storey structure in comparison with the EBF.Keywords: Friction Damper (FD), Slip Load, Nonlinear Dynamic Analysis, Performance Index.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27411727 Neuroblasts Micropatterning on Nanostructural Modified Chitosan Membranes
Authors: Chun-Yen Sung, Chung-Yao Yang, Tzu-Chun Liao, Wen-Shiang Chen, Chao-Min Cheng, J. Andrew Yeh
Abstract:
The study describes chitosan membrane platform modified with nanostructure pattern which using nanotechnology to fabricate. The cell-substrate interaction between neuro-2a neuroblasts cell lines and chitosan membrane (flat, nanostructure and nanostructure pattern types) was investigated. The adhered morphology of neuro-2a cells depends on the topography of chitosan surface. We have found that neuro-2a showed different morphogenesis when cells adhered on flat and nanostructure chitosan membrane. The cell projected area of neuro-2a on flat chitosan membrane is larger than on nanostructure chitosan membrane. In addition, neuro-2a cells preferred to adhere on flat chitosan surface region than on nanostructure chitosan membrane to immobilize and differentiation. The experiment suggests surface topography can be used as a critical mechanism to isolate group of neuro-2a to a particular rectangle area on chitosan membrane. Our finding will provide a platform to take patch clamp to record electrophysiological behavior about neurons in vitro in the future.Keywords: Chitosan membrane, neuro-2a, wet chemical etching, solvent casting.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17591726 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme
Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey
Abstract:
In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.
Keywords: E-Voting preparation stage, blind signature protocol, nonce based authentication scheme, Kerberos authentication protocol, pseudo voter identity scheme PVID.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16181725 Assessing Overall Thermal Conductance Value of Low-Rise Residential Home Exterior Above-Grade Walls Using Infrared Thermography Methods
Authors: Matthew D. Baffa
Abstract:
Infrared thermography is a non-destructive test method used to estimate surface temperatures based on the amount of electromagnetic energy radiated by building envelope components. These surface temperatures are indicators of various qualitative building envelope deficiencies such as locations and extent of heat loss, thermal bridging, damaged or missing thermal insulation, air leakage, and moisture presence in roof, floor, and wall assemblies. Although infrared thermography is commonly used for qualitative deficiency detection in buildings, this study assesses its use as a quantitative method to estimate the overall thermal conductance value (U-value) of the exterior above-grade walls of a study home. The overall U-value of exterior above-grade walls in a home provides useful insight into the energy consumption and thermal comfort of a home. Three methodologies from the literature were employed to estimate the overall U-value by equating conductive heat loss through the exterior above-grade walls to the sum of convective and radiant heat losses of the walls. Outdoor infrared thermography field measurements of the exterior above-grade wall surface and reflective temperatures and emissivity values for various components of the exterior above-grade wall assemblies were carried out during winter months at the study home using a basic thermal imager device. The overall U-values estimated from each methodology from the literature using the recorded field measurements were compared to the nominal exterior above-grade wall overall U-value calculated from materials and dimensions detailed in architectural drawings of the study home. The nominal overall U-value was validated through calendarization and weather normalization of utility bills for the study home as well as various estimated heat loss quantities from a HOT2000 computer model of the study home and other methods. Under ideal environmental conditions, the estimated overall U-values deviated from the nominal overall U-value between ±2% to ±33%. This study suggests infrared thermography can estimate the overall U-value of exterior above-grade walls in low-rise residential homes with a fair amount of accuracy.
Keywords: Emissivity, heat loss, infrared thermography, thermal conductance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8351724 Numerical Investigation of the Effect of Number of Waves on Heat Transfer in a Wavy Wall Enclosure
Authors: Ali Reza Tahavvor, Saeed Hosseini, Afshin Karimzadeh Fard
Abstract:
In this paper the effect of wall waviness of side walls in a two-dimensional wavy enclosure is numerically investigated. Two vertical wavy walls and straight top wall are kept isothermal and the bottom wall temperature is higher and spatially varying with cosinusoidal temperature distribution. A computational code based on Finite-volume approach is used to solve governing equations and SIMPLE method is used for pressure velocity coupling. Test is performed for several different numbers of undulations. The Prandtl number was kept constant and the Ra number denotes that the flow is laminar. Temperature and velocity fields are determined. Therefore, according to the obtained results a correlation is proposed for average Nusselt number as a function of number of side wall waves. The results indicate that the Nusselt number is highly affected by number of waves and increasing it decreases the wavy walls Nusselt number; although the Nusselt number is not highly affected by surface waviness when the number of undulations is below one.
Keywords: Cavity, natural convection, Nusselt number, wavy wall.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23581723 Design and Characteristics of New Test Facility for Flat Plate Boundary Layer Research
Authors: N. Patten, T. M. Young, P. Griffin
Abstract:
Preliminary results for a new flat plate test facility are presented here in the form of Computational Fluid Dynamics (CFD), flow visualisation, pressure measurements and thermal anemometry. The results from the CFD and flow visualisation show the effectiveness of the plate design, with the trailing edge flap anchoring the stagnation point on the working surface and reducing the extent of the leading edge separation. The flow visualization technique demonstrates the two-dimensionality of the flow in the location where the thermal anemometry measurements are obtained. Measurements of the boundary layer mean velocity profiles compare favourably with the Blasius solution, thereby allowing for comparison of future measurements with the wealth of data available on zero pressure gradient Blasius flows. Results for the skin friction, boundary layer thickness, frictional velocity and wall shear stress are shown to agree well with the Blasius theory, with a maximum experimental deviation from theory of 5%. Two turbulence generating grids have been designed and characterized and it is shown that the turbulence decay downstream of both grids agrees with established correlations. It is also demonstrated that there is little dependence of turbulence on the freestream velocity.Keywords: CFD, Flow Visualisation, Thermal Anemometry, Turbulence Grids.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17721722 Hip and Valley Support Location in Wood Framing
Authors: P. Hajyalikhani, B. Hudson, D. Boll, L. Boren, Z. Sparks, M. Ward
Abstract:
Wood Light frame construction is one of the most common types of construction methods for residential and light commercial building in North America and parts of Europe. The typical roof framing for wood framed building is sloped and consists of several structural members such as rafters, hips, and valleys which are connected to the ridge and ceiling joists. The common slopes for roofs are 3/12, 8/12, and 12/12. Wood framed residential roof failure is most commonly caused by wind damage in such buildings. In the recent study, one of the weaknesses of wood framed roofs is long unsupported structural member lengths, such as hips and valleys. The purpose of this research is to find the critical support location for long hips and valleys with different slopes. ForteWeb software is used to find the critical location. The analysis results demonstrating the maximum unbraced hip and valley length are from 8.5 to 10.25 ft. dependent on the slope and roof type.
Keywords: Light wood framed, bracing, construction, hip, valley, slope.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6871721 Influence of Turbulence Model, Grid Resolution and Free-Stream Turbulence Intensity on the Numerical Simulation of the Flow Field around an Inclined Flat Plate
Authors: M. Raciti Castelli, P. Cioppa, E. Benini
Abstract:
The flow field around a flat plate of infinite span has been investigated for several values of the angle of attack. Numerical predictions have been compared to experimental measurements, in order to examine the effect of turbulence model and grid resolution on the resultant aerodynamic forces acting on the plate. Also the influence of the free-stream turbulence intensity, at the entrance of the computational domain, has been investigated. A full campaign of simulations has been conducted for three inclination angles (9°, 15° and 30°), in order to obtain some practical guidelines to be used for the simulation of the flow field around inclined plates and discs.Keywords: CFD, lift, drag, flat plate
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15831720 E-government Security Modeling: Explaining Main Factors and Analysing Existing Models
Authors: N. Alharbi
Abstract:
E-government is becoming more important these days. However, the adoption of e-government is often slowed down by technical and non-technical security factors. Nowadays, there many security models that can make the e-government services more secure. This paper will explain the main security factors that affected the level of e-government security. Moreover, it will also analyse current existing models. Finally, the paper will suggest a comprehensive security model that will contain most of technical and non-technical factors.
Keywords: E-government, technical, non-technical, security model.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20731719 Security Risk Analysis Based on the Policy Formalization and the Modeling of Big Systems
Authors: Luc Cessieux, French Navy, Adrien Derock, DCNS/IMATH
Abstract:
Security risk models have been successful in estimating the likelihood of attack for simple security threats. However, modeling complex system and their security risk is even a challenge. Many methods have been proposed to face this problem. Often difficult to manipulate, and not enough all-embracing they are not as famous as they should with administrators and deciders. We propose in this paper a new tool to model big systems on purpose. The software, takes into account attack threats and security strength.
Keywords: Security, risk management, threat, modelization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13231718 Assessing Stakeholders’ Interests in Postal Security
Authors: T. Männistö, M. Finger
Abstract:
The events of October 2010, where terrorists managed to get explosive devices onboard of three passenger aircrafts and two air freighters, demonstrated weaknesses of the international air cargo and airmail security. Ever since, postal security has gained interest among policymakers and authorities. This study augments the limited body of academic literature on the topic bydemarcating areas of postal security, identifying relevant stakeholders in each area, and investigating why these stakeholders engage in postal security. Research is based on a case study on Swiss Post’s mail service.
Keywords: Dangerous goods, mail bombs, postal security, supply chain security, theft of mail, trafficking.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1683