202 resultados para atmospheric deep convection


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Natural convection in rectangular two-dimensional cavities with differentially heated side walls is a standard problem in numerical heat transfer. Most of the existing studies has considered the low Ra laminar regime. The general thrust of the present research is to investigate higher Ra flows extending into the unsteady and turbulent regimes where the physics is not fully understood and appropriate models for turbulence are not yet established. In the present study the Boussinesq approximation is being used, but the theoretical background and some preliminary results have been obtained[1] for flows with variable properties.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A computer code is developed for the numerical prediction of natural convection in rectangular two-dimensional cavities at high Rayleigh numbers. The governing equations are retained in the primitive variable form. The numerical method is based on finite differences and an ADI scheme. Convective terms may be approximated with either central or hybrid differencing for greater stability. A non-uniform grid distribution is possible for greater efficiency. The pressure is dealt with via a SIMPLE type algorithm and the use of a fast elliptic solver for the solenoidal velocity correction field significantly reduces computing times. Preliminary results indicate that the code is reasonably accurate, robust and fast compared with existing benchmarks and finite difference based codes, particularly at high Rayleigh numbers. Extension to three-dimensional problems and turbulence studies in similar geometries is readily possible and indicated.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Numerical predictions are obtained for laminar natural convection of air in a square two dimensional cavity at high Rayleigh numbers. Proper resolution of the core reveals weak multi-cellular structure which varies in a complex manner as the effects of convection are increased. The end of the steady laminar regime is numerically estimated to occur at Ra=2.2x10^8.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A computer program has been developed for the prediction of buoyancy-driven laminar and turbulent flow in rectangular air-filled two-dimensional cavities with differentially heated side walls. Laminar flow predictions for a square cavity and Rayleigh numbers from Ra = 10^3 up to the onset of unsteady flow have been obtained. Accurate solutions for Ra = 5 x 10^6, 10^7, 5 x 10^7 and 10^8 are presented and an estimate for the critical Rayleigh number at which the steady laminar flow becomes unsteady is given for this geometry. Numerical predictions of turbulent flow have been obtained for RaH~0(10^9 -10^11 ) and compared with existing experimental data. A previously developed second moment closure model (Behnia et al. 1987) has been used to model the turbulence. Results indicate that a second moment closure model is capable of predicting the observed flow features.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"This chapter discusses laminar and turbulent natural convection in rectangular cavities. Natural convection in rectangular two-dimensional cavities has become a standard problem in numerical heat transfer because of its relevance in understanding a number of problems in engineering. Current research identified a number of difficulties with regard to the numerical methods and the turbulence modeling for this class of flows. Obtaining numerical predictions at high Rayleigh numbers proved computationally expensive such that results beyond Ra ∼ 1014 are rarely reported. The chapter discusses a study in which it was found that turbulent computations in square cavities can't be extended beyond Ra ∼ O (1012) despite having developed a code that proved very efficient for the high Ra laminar regime. As the Rayleigh number increased, thin boundary layers began to form next to the vertical walls, and the central region became progressively more stagnant and highly stratified. Results obtained for the high Ra laminar regime were in good agreement with existing studies. Turbulence computations, although of a preliminary nature, indicated that a second moment closure model was capable of predicting the experimentally observed flow features."--Publisher Summary

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter provides a critical legal geography of outer Space, charting the topography of the debates and struggles around its definition, management, and possession. As the emerging field of critical legal geography demonstrates, law is not a neutral organiser of space, but is instead a powerful cultural technology of spatial production. Drawing on legal documents such as the Outer Space Treaty and the Moon Treaty, as well as on the analogous and precedent-setting legal geographies of Antarctica and the deep seabed, the chapter addresses key questions about the legal geography of outer Space, questions which are of growing importance as Space’s available satellite spaces in the geostationary orbit diminish, Space weapons and mining become increasingly viable, Space colonisation and tourism emerge, and questions about Space’s legal status grow in intensity. Who owns outer Space? Who, and whose rules, govern what may or may not (literally) take place there? Is the geostationary orbit the sovereign property of the equatorial states it supertends, as these states argued in the 1970s? Or is it a part of the res communis, or common property of humanity, which currently legally characterises outer Space? Does Space belong to no one, or to everyone? As challenges to the existing legal spatiality of outer Space emerge from spacefaring states, companies, and non-spacefaring states, it is particularly critical that the current spatiality of Space is understood and considered.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Deep packet inspection is a technology which enables the examination of the content of information packets being sent over the Internet. The Internet was originally set up using “end-to-end connectivity” as part of its design, allowing nodes of the network to send packets to all other nodes of the network, without requiring intermediate network elements to maintain status information about the transmission. In this way, the Internet was created as a “dumb” network, with “intelligent” devices (such as personal computers) at the end or “last mile” of the network. The dumb network does not interfere with an application's operation, nor is it sensitive to the needs of an application, and as such it treats all information sent over it as (more or less) equal. Yet, deep packet inspection allows the examination of packets at places on the network which are not endpoints, In practice, this permits entities such as Internet service providers (ISPs) or governments to observe the content of the information being sent, and perhaps even manipulate it. Indeed, the existence and implementation of deep packet inspection may challenge profoundly the egalitarian and open character of the Internet. This paper will firstly elaborate on what deep packet inspection is and how it works from a technological perspective, before going on to examine how it is being used in practice by governments and corporations. Legal problems have already been created by the use of deep packet inspection, which involve fundamental rights (especially of Internet users), such as freedom of expression and privacy, as well as more economic concerns, such as competition and copyright. These issues will be considered, and an assessment of the conformity of the use of deep packet inspection with law will be made. There will be a concentration on the use of deep packet inspection in European and North American jurisdictions, where it has already provoked debate, particularly in the context of discussions on net neutrality. This paper will also incorporate a more fundamental assessment of the values that are desirable for the Internet to respect and exhibit (such as openness, equality and neutrality), before concluding with the formulation of a legal and regulatory response to the use of this technology, in accordance with these values.