928 resultados para SCALING LAWS


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Monitoring and assessing environmental health is becoming increasingly important as human activity and climate change place greater pressure on global biodiversity. Acoustic sensors provide the ability to collect data passively, objectively and continuously across large areas for extended periods of time. While these factors make acoustic sensors attractive as autonomous data collectors, there are significant issues associated with large-scale data manipulation and analysis. We present our current research into techniques for analysing large volumes of acoustic data effectively and efficiently. We provide an overview of a novel online acoustic environmental workbench and discuss a number of approaches to scaling analysis of acoustic data; collaboration, manual, automatic and human-in-the loop analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A scaling analysis is performed for the transient boundary layer established adjacent to an inclined flat plate following a ramp cooling boundary condition. The imposed wall temperature decreases linearly up to a specific value over a specific time. It is revealed that if the ramp time is sufficiently large then the boundary layer reaches quasi-steady mode before the growth of the temperature is finished. However, if the ramp time is shorter then the steady state of the boundary layer may be reached after the growth of the temperature is completed. In this case, the ultimate steady state is the same as if the start up had been instantaneous. Note that the cold boundary layer adjacent to the plate is potentially unstable to Rayleigh-Bénard instability if the Rayleigh number exceeds a certain critical value for this cooling case. The onset of instability may set in at different stages of the boundary layer development. A proper identification of the time when the instability may set in is discussed. A numerical verification of the time for the onset of instability is presented in this study. Different flow regimes based on the stability of the boundary layer have also been discussed with numerical results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The natural convection boundary layer adjacent to an inclined plate subject to sudden cooling boundary condition has been studied. It is found that the cold boundary layer adjacent to the plate is potentially unstable to Rayleigh-Bénard instability if the Rayleigh number exceeds a certain critical value. A scaling relation for the onset of instability of the boundary layer is achieved. The scaling relations have been developed by equating important terms of the governing equations based on the development of the boundary layer with time. The flow adjacent to the plate can be classified broadly into a conductive, a stable convective or an unstable convective regime determined by the Rayleigh number. Proper scales have been established to quantify the flow properties in each of these flow regimes. An appropriate identification of the time when the instability may set in is discussed. A numerical verification of the time for the onset of instability is also presented in this study. Different flow regimes based on the stability of the boundary layer have been discussed with numerical results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Unsteady natural convection inside a triangular cavity subject to a non-instantaneous heating on the inclined walls in the form of an imposed temperature which increases linearly up to a prescribed steady value over a prescribed time is reported. The development of the flow from start-up to a steady-state has been described based on scaling analyses and direct numerical simulations. The ramp temperature has been chosen in such a way that the boundary layer is reached a quasi-steady mode before the growth of the temperature is completed. In this mode the thermal boundary layer at first grows in thickness, then contracts with increasing time. However, if the imposed wall temperature growth period is sufficiently short, the boundary layer develops differently. It is seen that the shape of many houses are isosceles triangular cross-section. The heat transfer process through the roof of the attic-shaped space should be well understood. Because, in the building energy, one of the most important objectives for design and construction of houses is to provide thermal comfort for occupants. Moreover, in the present energy-conscious society it is also a requirement for houses to be energy efficient, i.e. the energy consumption for heating or air-conditioning houses must be minimized.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The natural convection thermal boundary layer adjacent to an abruptly heated inclined flat plate is investigated through a scaling analysis and verified by numerical simulations. In general, the development of the thermal flow can be characterized by three distinct stages, i.e. a start-up stage, a transitional stage and a steady state stage. Major scales including the flow velocity, flow development time, and the thermal and viscous boundary layer thicknesses are established to quantify the flow development at different stages and over a wide range of flow parameters. Details of the scaling analysis and the numerical procedures are described in this paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A scaling analysis for the natural convection boundary layer adjacent to an inclined semi-infinite plate subject to a non-instantaneous heating in the form of an imposed wall temperature which increases linearly up to a prescribed steady value over a prescribed time is reported. The development of the flow from start-up to a steady-state has been described based on scaling analyses and verified by numerical simulations. The analysis reveals that, if the period of temperature growth on the wall is sufficiently long, the boundary layer reaches a quasisteady mode before the growth of the temperature is completed. In this mode the thermal boundary layer at first grows in thickness and then contracts with increasing time. However, if the imposed wall temperature growth period is sufficiently short, the boundary layer develops differently, but after the wall temperature growth is completed, the boundary layer develops as though the start up had been instantaneous. The steady state values of the boundary layer for both cases are ultimately the same.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Natural convection thermal boundary layer adjacent to an instantaneous heated inclined flat plate is investigated through a scaling analysis and verified by direct numerical simulations. It is revealed from the analysis that the development of the boundary layer may be characterized by three distinct stages, i.e. a start-up stage, a transitional stage and a steady state stage. These three stages can be clearly identified from the numerical simulations. Major scales including the flow velocity, flow development time, and the thermal and viscous boundary layer thicknesses are established to quantify the flow development at different stages and over a wide range of flow parameters. Details of the scaling analysis are described in this paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The scaling to characterize unsteady boundary layer development for thermo-magnetic convection of paramagnetic fluids with the Prandtl number greater than one is developed. Under the consideration is a square cavity with initially quiescent isothermal fluid placed in microgravity condition (g = 0) and subject to a uniform, vertical gradient magnetic field. A distinct magnetic thermal-boundary layer is produced by sudden imposing of a higher temperature on the vertical sidewall and as an effect of magnetic body force generated on paramagnetic fluid. The transient flow behavior of the resulting boundary layer is shown to be described by three stages: the start-up stage, the transitional stage and the steady state. The scaling is verified by numerical simulations with the magnetic momentum parameter m variation and the parameter γRa variation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The central contention of this article is that there is a need for greater involvement of legislators in overseeing a systematic and rights-based scrutiny of the impact of legislation and policy. The recent operation of Australia s asylum laws and policies, in particular provides an illustration of the reforms required. Challenges to the rights of non-citizens in Australia and other jurisdictions serve as a reminder of the extent of change required before rights are firmly entrenched in the processes of government. A useful step forward would be to enhance the role of legislators in setting the criteria and agenda for post-enactment scrutiny in light of issues raised during pre-legislative scrutiny.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The unsteady natural convection boundary layer adjacent to an instantaneously heated inclined plate is investigated using an improved scaling analysis and direct numerical simulations. The development of the unsteady natural convection boundary layer following instantaneous heating may be classified into three distinct stages including a start-up stage, a transitional stage and a steady state stage, which can be clearly identified in the analytical and numerical results. Major scaling relations of the velocity and thicknesses and the flow development time of the natural convection boundary layer are obtained using triple-layer integral solutions and verified by direct numerical simulations over a wide range of flow parameters.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We describe a scaling method for templating digital radiographs using conventional acetate templates independent of template magnification without the need for a calibration marker. The mean magnification factor for the radiology department was determined (119.8%, range117%-123.4%). This fixed magnification factor was used to scale the radiographs by the method described. 32 femoral heads on postoperative THR radiographs were then measured and compared to the actual size. The mean absolute accuracy was within 0.5% of actual head size (range 0 to 3%) with a mean absolute difference of 0.16mm (range 0-1mm, SD 0.26mm). Intraclass Correlation Coefficient (ICC) showed excellent reliability for both inter and intraobserver measurements with ICC scores of 0.993 (95% CI 0.988-0.996) for interobserver measurements and intraobserver measurements ranging between 0.990-0.993 (95% CI 0.980-0.997).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.