997 resultados para transfer schemes


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Unstructured grid meshes used in most commercial CFD codes inevitably adopt collocated variable solution schemes. These schemes have several shortcomings, mainly due to the interpolation of the pressure gradient, that lead to slow convergence. In this publication we show how it is possible to use a much more stable staggered mesh arrangement in an unstructured code. Several alternative groupings of variables are investigated in a search for the optimum scheme.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cooling techniques play a key role in improving efficiency and power output of modern gas turbines. The conjugate technique of film and impingement cooling schemes is considered in this study. The Multi-Stage Cooling Scheme (MSCS) involves coolant passing from inside to outside turbine blade through two stages. The first stage; the coolant passes through first hole to internal gap where the impinging jet cools the external layer of the blade. Finally, the coolant passes through the internal gap to the second hole which has specific designed geometry for external film cooling. The effect of design parameters, such as, offset distance between two-stage holes, gap height, and inclination angle of the first hole, on upstream conjugate heat transfer rate and downstream film cooling effectiveness performance are investigated computationally. An Inconel 617 alloy with variable properties is selected for the solid material. The conjugate heat transfer and film cooling characteristics of MSCS are analyzed across blowing ratios of Br = 1 and 2 for density ratio, 2. This study presents upstream wall temperature distributions due to conjugate heat transfer for different gap design parameters. The maximum film cooling effectiveness with upstream conjugate heat transfer is less than adiabatic film cooling effectiveness by 24–34%. However, the full coverage of cooling effectiveness in spanwise direction can be obtained using internal cooling with conjugate heat transfer, whereas adiabatic film cooling effectiveness has narrow distribution.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Hydro-entanglement is a versatile process for bonding non-woven fabrics by the use of fine, closely-spaced, high-velocity jets of water to rearrange and entangle arrays of fibres. The cost of the process mainly depends on the amount of energy consumed. Therefore, the economy of the process is highly affected by optimisation of the energy required. In this paper a parameter called critical pressure is introduced which is indicative of the energy level requirement. The results of extensive experimental work are reported and analysed to give a clear understanding of the effect of the web and fibre properties on the critical pressure in the hydro-entanglement process. Furthermore, different energy-transfer distribution schemes are tested on various fabrics. The optimum scheme which involves the lowest energy consumption and the best fabric properties is identified. © 2001 Published by Elsevier Science Ltd. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multi-antenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the cellular base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, we propose a new power transfer policy, namely, best power beacon (BPB) power transfer. To characterize the power transfer reliability of the proposed policy, we derive new closed-form expressions for the exact power outage probability and the asymptotic power outage probability with large antenna arrays at PBs. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), and 2) nearest receiver selection (NRS). To assess the secrecy performance, we derive new expressions for the secrecy throughput considering the two receiver selection schemes using the BPB power transfer policies. We show that secrecy performance improves with increasing densities of PBs and D2D receivers because of a larger multiuser diversity gain. A pivotal conclusion is reached that BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multiantenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, three wireless power transfer (WPT) policies are proposed: 1) co-operative power beacons (CPB) power transfer, 2) best power beacon (BPB) power transfer, and 3) nearest power beacon (NPB) power transfer. To characterize the power transfer reliability of the proposed three policies, we derive new expressions for the exact power outage probability. Moreover, the analysis of the power outage probability is extended to the case when PBs are equipped with large antenna arrays. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), where the receiver with the strongest channel is selected; and 2) nearest receiver selection (NRS), where the nearest receiver is selected. To assess the secrecy performance, we derive new analytical expressions for the secrecy outage probability and the secrecy throughput considering the two receiver selection schemes using the proposed WPT policies. We presented Monte carlo simulation results to corroborate our analysis and show: 1) secrecy performance improves with increasing densities of PBs and D2D receivers due to larger multiuser diversity gain; 2) CPB achieves better secrecy performance than BPB and NPB but consumes more power; and 3) BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead. A pivotal conclusion- is reached that with increasing number of antennas at PBs, NPB offers a comparable secrecy performance to that of BPB but with a lower complexity.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Eventhough a large number of schemes have been proposed and develoned for N9 laser ouined dye lasers the relatively low efficiency compelled the scientists to device new methods to improve the system efficiencs. Energy transfer mechanism has been shown to he a convenien tool for the enhancement of efficiency of dye lasers. Th p resent work covers a detailed study of the performance characteristics of a N2 laser pumped dye laser in the con— ventional mode and also, when pumped by the energy transfer mechanism. For .th.e present investigations a dye laser pumped by a'N2 laser (A4200 kw peak power) was fabricated. The grating at grazing incidence was used as the beam expanding device; A t its best performance the system was giving an output peak power of l5 kW for a 5 X lC"3H/l Rh—€ solution in methanol. T he conversion efficiency was 7.5; The output beam was having 3 divergence of 2 mrad and bandwidth o.9 A. Suitable modifications were suggested for obtaining better conversion efficiency and bandwidth.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We include solvation effects in tight-binding Hamiltonians for hole states in DNA. The corresponding linear-response parameters are derived from accurate estimates of solvation energy calculated for several hole charge distributions in DNA stacks. Two models are considered: (A) the correction to a diagonal Hamiltonian matrix element depends only on the charge localized on the corresponding site and (B) in addition to this term, the reaction field due to adjacent base pairs is accounted for. We show that both schemes give very similar results. The effects of the polar medium on the hole distribution in DNA are studied. We conclude that the effects of polar surroundings essentially suppress charge delocalization in DNA, and hole states in (GC)n sequences are localized on individual guanines

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Successful knowledge transfer is an important process which requires continuous improvement in today’s knowledge-intensive economy. However, improving knowledge transfer processes represents a challenge for construction practitioners due to the complexity of knowledge acquisition, codification and sharing. Although knowledge transfer is context based, understanding the critical success factors can lead to improvements in the transfer process. This paper seeks to identify and evaluate the most significant critical factors for improving knowledge transfer processes in Public Private Partnerships/Private Finance Initiatives (PPP/PFI) projects. Drawing upon a questionnaire survey of 52 construction firms located in the UK, data is analysed using Severity Index (SI) and Coefficient of Variation (COV), to examine and identify these factors in PPP/PFI schemes. The findings suggest that a supportive leadership, participation/commitment from the relevant parties, and good communication between the relevant parties are crucial to improving knowledge transfer processes in PFI schemes. Practitioners, managers and researchers can use the findings to efficiently design performance measures for analysing and improving knowledge transfer processes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The retrieval (estimation) of sea surface temperatures (SSTs) from space-based infrared observations is increasingly performed using retrieval coefficients derived from radiative transfer simulations of top-of-atmosphere brightness temperatures (BTs). Typically, an estimate of SST is formed from a weighted combination of BTs at a few wavelengths, plus an offset. This paper addresses two questions about the radiative transfer modeling approach to deriving these weighting and offset coefficients. How precisely specified do the coefficients need to be in order to obtain the required SST accuracy (e.g., scatter <0.3 K in week-average SST, bias <0.1 K)? And how precisely is it actually possible to specify them using current forward models? The conclusions are that weighting coefficients can be obtained with adequate precision, while the offset coefficient will often require an empirical adjustment of the order of a few tenths of a kelvin against validation data. Thus, a rational approach to defining retrieval coefficients is one of radiative transfer modeling followed by offset adjustment. The need for this approach is illustrated from experience in defining SST retrieval schemes for operational meteorological satellites. A strategy is described for obtaining the required offset adjustment, and the paper highlights some of the subtler aspects involved with reference to the example of SST retrievals from the imager on the geostationary satellite GOES-8.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Models for water transfer in the crop-soil system are key components of agro-hydrological models for irrigation, fertilizer and pesticide practices. Many of the hydrological models for water transfer in the crop-soil system are either too approximate due to oversimplified algorithms or employ complex numerical schemes. In this paper we developed a simple and sufficiently accurate algorithm which can be easily adopted in agro-hydrological models for the simulation of water dynamics. We used a dual crop coefficient approach proposed by the FAO for estimating potential evaporation and transpiration, and a dynamic model for calculating relative root length distribution on a daily basis. In a small time step of 0.001 d, we implemented algorithms separately for actual evaporation, root water uptake and soil water content redistribution by decoupling these processes. The Richards equation describing soil water movement was solved using an integration strategy over the soil layers instead of complex numerical schemes. This drastically simplified the procedures of modeling soil water and led to much shorter computer codes. The validity of the proposed model was tested against data from field experiments on two contrasting soils cropped with wheat. Good agreement was achieved between measurement and simulation of soil water content in various depths collected at intervals during crop growth. This indicates that the model is satisfactory in simulating water transfer in the crop-soil system, and therefore can reliably be adopted in agro-hydrological models. Finally we demonstrated how the developed model could be used to study the effect of changes in the environment such as lowering the groundwater table caused by the construction of a motorway on crop transpiration. (c) 2009 Elsevier B.V. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The high computational cost of calculating the radiative heating rates in numerical weather prediction (NWP) and climate models requires that calculations are made infrequently, leading to poor sampling of the fast-changing cloud field and a poor representation of the feedback that would occur. This paper presents two related schemes for improving the temporal sampling of the cloud field. Firstly, the ‘split time-stepping’ scheme takes advantage of the independent nature of the monochromatic calculations of the ‘correlated-k’ method to split the calculation into gaseous absorption terms that are highly dependent on changes in cloud (the optically thin terms) and those that are not (optically thick). The small number of optically thin terms can then be calculated more often to capture changes in the grey absorption and scattering associated with cloud droplets and ice crystals. Secondly, the ‘incremental time-stepping’ scheme uses a simple radiative transfer calculation using only one or two monochromatic calculations representing the optically thin part of the atmospheric spectrum. These are found to be sufficient to represent the heating rate increments caused by changes in the cloud field, which can then be added to the last full calculation of the radiation code. We test these schemes in an operational forecast model configuration and find a significant improvement is achieved, for a small computational cost, over the current scheme employed at the Met Office. The ‘incremental time-stepping’ scheme is recommended for operational use, along with a new scheme to correct the surface fluxes for the change in solar zenith angle between radiation calculations.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The alternant heat transfer induced by particle packet and gas bubbles on an object surface in a gas fluidised bed is computationally studied. The particle packet and bubble are modelled by a DPPM (double particle-layer and Porous Medium) model and a hemispherical model, respectively. Different meshing schemes are applied and different mesh sizes are used in meshing particle packet and heated object and a very large geometrical size difference between them was considered. Two parallel solver processes were proposed to perform the simulation of heat transfer for different purposes and implemented with the Fluent CFD package.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The heat transfer on the surface of an object in a gas fluidised bed is sequentially and alternately induced by particle-packet and gas bubble. This phenomenon is studied with computational simulation. The particle-packet and bubble are modelled by a double particle-layers and porous medium model and a hemispherical model, respectively. The heat transfer to and within the object is simulated concurrently. Different grid schemes are applied and different grid sizes are used in meshing the particle-packet and the object as there is a very large difference in their geometrical sizes. Based on theoretical analysis, an approximate method is developed to calculate the heat flux at the surface of the object. The simulation is implemented in a CFD package and the results are compared with experiments.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we propose a secure ownership transfer protocol for a multi-tag and multi-owner RFID environment. Most of the existing work in this area do not comply with the EPC Global Class-1 Gen-2 (C1G2) standard since they use expensive hash operations or sophisticated encryption schemes that cannot be implemented on low-cost passive tags that are highly resource constrained. Our work aims to fill this gap by proposing a protocol based on simple XOR and 128-bit Pseudo Random Number Generators (PRNG), operations that can be easily implemented on low-cost passive RFID tags. The protocol thus achieves EPC C1G2 compliance while meeting the security requirements. Also, our protocol provides additional protection using a blind-factor to prevent tracking attacks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we propose a secure ownership transfer protocol for a multi-tag multi-owner RFID environment that provides individual-owner-privacy. To our knowledge, the existing schemes do not provide individual-owner-privacy and most of the existing schemes do not comply with the EPC Global Class-1 Gen-2 (C1G2) standard since the protocols use expensive hash operations or sophisticated encryption schemes that cannot be implemented on low-cost passive tags that are highly resource constrained. Our work aims to fill these gaps by proposing a protocol that provides individual-owner-privacy, based on simple XOR and 128-bit pseudo-random number generators (PRNG), operations that are easily implemented on low-cost RFID tags while meeting the necessary security requirements thus making it a viable option for large scale implementations. Our protocol also provides additional protection by hiding the pseudo-random numbers during all transmissions using a blind-factor to prevent tracking attacks.