875 resultados para Computation in architecture
Resumo:
The Extended Weighted Residuals Method (EWRM) is applied to investigate the effects of viscous dissipation on the thermal development of forced convection in a porous-saturated duct of rectangular cross-section with isothermal boundary condition. The Brinkman flow model is employed for determination of the velocity field. The temperature in the flow field was computed by utilizing the Green’s function solution based on the EWRM. Following the computation of the temperature field, expressions are presented for the local Nusselt number and the bulk temperature as a function of the dimensionless longitudinal coordinate. In addition to the aspect ratio, the other parameters included in this computation are the Darcy number, viscosity ratio, and the Brinkman number.
Resumo:
A hydraulic jump is characterized by strong energy dissipation and mixing, large-scale turbulence, air entrainment, waves and spray. Despite recent pertinent studies, the interaction between air bubbles diffusion and momentum transfer is not completely understood. The objective of this paper is to present experimental results from new measurements performed in rectangular horizontal flume with partially-developed inflow conditions. The vertical distributions of void fraction and air bubbles count rate were recorded for inflow Froude number Fr1 in the range from 5.2 to 14.3. Rapid detrainment process was observed near the jump toe, whereas the structure of the air diffusion layer was clearly observed over longer distances. These new data were compared with previous data generally collected at lower Froude numbers. The comparison demonstrated that, at a fixed distance from the jump toe, the maximum void fraction Cmax increases with the increasing Fr1. The vertical locations of the maximum void fraction and bubble count rate were consistent with previous studies. Finally, an empirical correlation between the upper boundary of the air diffusion layer and the distance from the impingement point was provided.
Resumo:
For centuries, hydraulic engineers were at the forefront of science. The last forty years marked a change of perception in our society with a focus on environmental sustainability and management, particularly in developed countries. Herein, the writer illustrates his strong belief that the future of hydraulic engineering lies upon a combination of innovative engineering, research excellence and higher education of quality. This drive continues a long tradition established by eminent scholars like Arthur Thomas IPPEN, John Fisher KENNEDY and Hunter ROUSE.
Resumo:
Power system real time security assessment is one of the fundamental modules of the electricity markets. Typically, when a contingency occurs, it is required that security assessment and enhancement module shall be ready for action within about 20 minutes’ time to meet the real time requirement. The recent California black out again highlighted the importance of system security. This paper proposed an approach for power system security assessment and enhancement based on the information provided from the pre-defined system parameter space. The proposed scheme opens up an efficient way for real time security assessment and enhancement in a competitive electricity market for single contingency case
Resumo:
Data mining is the process to identify valid, implicit, previously unknown, potentially useful and understandable information from large databases. It is an important step in the process of knowledge discovery in databases, (Olaru & Wehenkel, 1999). In a data mining process, input data can be structured, seme-structured, or unstructured. Data can be in text, categorical or numerical values. One of the important characteristics of data mining is its ability to deal data with large volume, distributed, time variant, noisy, and high dimensionality. A large number of data mining algorithms have been developed for different applications. For example, association rules mining can be useful for market basket problems, clustering algorithms can be used to discover trends in unsupervised learning problems, classification algorithms can be applied in decision-making problems, and sequential and time series mining algorithms can be used in predicting events, fault detection, and other supervised learning problems (Vapnik, 1999). Classification is among the most important tasks in the data mining, particularly for data mining applications into engineering fields. Together with regression, classification is mainly for predictive modelling. So far, there have been a number of classification algorithms in practice. According to (Sebastiani, 2002), the main classification algorithms can be categorized as: decision tree and rule based approach such as C4.5 (Quinlan, 1996); probability methods such as Bayesian classifier (Lewis, 1998); on-line methods such as Winnow (Littlestone, 1988) and CVFDT (Hulten 2001), neural networks methods (Rumelhart, Hinton & Wiliams, 1986); example-based methods such as k-nearest neighbors (Duda & Hart, 1973), and SVM (Cortes & Vapnik, 1995). Other important techniques for classification tasks include Associative Classification (Liu et al, 1998) and Ensemble Classification (Tumer, 1996).
Resumo:
This paper will examine attitudes to eclectic stylistic borrowing in Japan in the twentieth century in light of the concept of authenticity. I am particularly interested in how an earlier claim correlating European modernist and traditional Japanese architecture continues to colour conceptions about what is an 'authentic' response for Japanese architects to make to contemporary conditions. Non-Western and vernacular architectures generally have been the repository for touristic desires for regional authenticity and difference. Yet Japan's unique role in the development of modernist architecture has given a peculiar intensity to the demand for its architecture to resist a perceived postmodern decadence.
Resumo:
Published in the final months of 1891, Architecture, Mysticism and Myth was the first architectural treatise written by the late nineteenth-century English architect and theorist William Richard Lethaby (1857-1931).' Documenting the characteristic attributes of the architectural myth of the "temple idea", and its presence amongst architectures of multiple ancient cultures, the text was endowed with a distinctly historical tone. In examining the motives behind myth, which Lethaby defined as the interaction and reaction between the natural universe and the built environment, Lethaby also injected a series of theoretical considerations into the text. It is clear that Lethaby's interest in the temple idea was not limited to its curious, prolific presence in past architectures, hut also embraced a consideration of what lessons the temple idea may contribute to the struggle of the late nineteenth-century English architect to define an "art of the future".
Resumo:
Heat transfer and entropy generation analysis of the thermally developing forced convection in a porous-saturated duct of rectangular cross-section, with walls maintained at a constant and uniform heat flux, is investigated based on the Brinkman flow model. The classical Galerkin method is used to obtain the fully developed velocity distribution. To solve the thermal energy equation, with the effects of viscous dissipation being included, the Extended Weighted Residuals Method (EWRM) is applied. The local (three dimensional) temperature field is solved by utilizing the Green’s function solution based on the EWRM where symbolic algebra is being used for convenience in presentation. Following the computation of the temperature field, expressions are presented for the local Nusselt number and the bulk temperature as a function of the dimensionless longitudinal coordinate, the aspect ratio, the Darcy number, the viscosity ratio, and the Brinkman number. With the velocity and temperature field being determined, the Second Law (of Thermodynamics) aspect of the problem is also investigated. Approximate closed form solutions are also presented for two limiting cases of MDa values. It is observed that decreasing the aspect ratio and MDa values increases the entropy generation rate.
Resumo:
This paper considers the relationship between the recent historiography (of the last quarter century) of “New Zealand architecture” and the historical notion of “New Zealand-ness” invoked in contemporary architecture. It argues that a more recent programmatic uptake of post-War discussions on national identity and regional specificity has fed the tendencies of practicing architects to defer to history in rhetorical defences of their work: the beach-side mansion as a contemporary expression of the 1950s bach; a formal modernism divorced from the social discourse adherent to the historical moment that it “restates”; and so on. The paper will consider instances in the historiography of New Zealand architecture where historians have compounded, consciously or accidentally, a problem that is systemic to the uses made by architects of historical knowledge (in the most general examples), identifying the difficulties of relying upon the tentative conclusions of an under-studied field in developing principles of contemporary architectural practice under the banners of New Zealand-ness, regionalism, or localism, or with reference to icons of New Zealand architectural history. At the heart of this paper is a reflection on historiographical responsibility in presenting knowledge of a national past to an audience that is eager to transform that knowledge into principles of contemporary production. What, the paper asks, is the historical basis for speaking of a New Zealand architecture? Can we speak of a national history of architecture distinct from a regional history, or from an international history of architecture?
Resumo:
Coset enumeration is a most important procedure for investigating finitely presented groups. We present a practical parallel procedure for coset enumeration on shared memory processors. The shared memory architecture is particularly interesting because such parallel computation is both faster and cheaper. The lower cost comes when the program requires large amounts of memory, and additional CPU's. allow us to lower the time that the expensive memory is being used. Rather than report on a suite of test cases, we take a single, typical case, and analyze the performance factors in-depth. The parallelization is achieved through a master-slave architecture. This results in an interesting phenomenon, whereby the CPU time is divided into a sequential and a parallel portion, and the parallel part demonstrates a speedup that is linear in the number of processors. We describe an early version for which only 40% of the program was parallelized, and we describe how this was modified to achieve 90% parallelization while using 15 slave processors and a master. In the latter case, a sequential time of 158 seconds was reduced to 29 seconds using 15 slaves.
Resumo:
Krylov subspace techniques have been shown to yield robust methods for the numerical computation of large sparse matrix exponentials and especially the transient solutions of Markov Chains. The attractiveness of these methods results from the fact that they allow us to compute the action of a matrix exponential operator on an operand vector without having to compute, explicitly, the matrix exponential in isolation. In this paper we compare a Krylov-based method with some of the current approaches used for computing transient solutions of Markov chains. After a brief synthesis of the features of the methods used, wide-ranging numerical comparisons are performed on a power challenge array supercomputer on three different models. (C) 1999 Elsevier Science B.V. All rights reserved.AMS Classification: 65F99; 65L05; 65U05.
Resumo:
Plant architecture has been neglected in most studies of biomass allocation in crops. To help redress this situation for grain sorghum (Sorghum bicolor (L.) Moench), we used a 3D digitiser to measure the dimensions and orientations of vegetative and reproductive structures and derived thermal time-based functions for architectural changes during morphogenesis. Our plants, which were grown in a greenhouse, controlled environment cabinets and the field, covered a large, three-fold, size range when mature. This allowed us to detect some general architectural relationships and to fit morphogenetic functions common across the size range we observed. For example, the relationship between the lengths of successive fully-expanded leaves within a plant was nearly constant for all plants. The lengths of existing leaf blades were accurate predictors of the lengths of up to six subsequently-formed blades in our plants. Similar constant relationships were detected for internode lengths in the panicle and for heights above ground of the collars of successive leaves, even though these traits varied a lot between growth conditions. We suggest that such architectural relationships may be used to link the effect of previous growth conditions to future growth potential, and in that way to predict future partitioning. Our results provide the basis for a preliminary model of sorghum morphogenesis which could eventually become useful in conjunction with crop models by allowing resource acquisition to be related to changes in plant architecture during development. (C) 1999 Elsevier Science B.V. All rights reserved.