237 results
Search Results
2. 3D Modeling of the Different Boiling Regimes During Spill and Spreading of Liquid Hydrogen.
- Author
-
Jaekel, C., Verfondern, K., Kelm, S., Jahn, W., and Allelein, H.-J.
- Subjects
EBULLITION ,LIQUID hydrogen ,ELECTRIC power production ,ENERGY storage ,MATHEMATICAL models ,ENERGY industries ,NUCLEATION - Abstract
Abstract: In a future energy generation market, the storage of energy is going to become increasingly important. Besides classic ways of storage, like pumped storage hydro power stations, etc, the production of hydrogen will play an important role as an energy storage system. Hydrogen may be stored as a liquefied gas (LH2) on a long term base as well as for short term supply of fuel stations to ensure a so called “green” mobility. The handling with LH2 has been subject to several recent safety studies. In this context reliable simulation tools are necessary to predict the spill and spreading of LH2 during an accidental release. This paper deals with the different boiling regimes: film boiling, transition boiling and nucleation boiling after a release and their modeling by means of an inhouse-code for wall evaporation, which is implemented in the commercial CFD code ANSYS CFX. The paper will describe the model, its implementation and validation against experimental data, such as the HSL LH2 spill experiments [1]. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
3. Experimental Study And Simulation Of Airflow In Solar Chimneys.
- Author
-
Saifi, Nadia, Settou, Noureddine, Dokkar, Boubekeur, Negrou, Belkhir, and Chennouf, Nasreddine
- Subjects
CHIMNEYS ,COMPUTATIONAL fluid dynamics ,FINITE volume method ,AIR flow ,SIMULATION methods & models ,MATHEMATICAL models ,PERFORMANCE evaluation - Abstract
Abstract: A detailed mathematical simulation and experimental investigation of airflow in solar chimneys is studied in this paper. Several experimental studies were carried out on the solar chimney; their choice depends on the parameter of the design and the thermal performances for different geometrical configurations. The experimental tests show that the field speeds in the chimney is influenced by the width of the channel and also of the angle of inclination of the chimney. Therefore, investigations have been carried out in this paper to find the effect of inclination on the performance of solar chimney in Ouargla Province, Algeria. The simulation of this problem is implemented into the commercial CFD code Fluent 6.3. 26. The conservation equations of mass, continuity and energy are solved by the Finite Volume Method. The validation of the results is presented. An good agreement between the experimental results and simulation ones is observed. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
4. The Design and Optimization for The Dome of Tidal Turbine.
- Author
-
Lu, Hong-bo, Li, Yong-lin, Ma, Liang-liang, and Pao, Xiu-ling
- Subjects
ENGINEERING design ,MATHEMATICAL optimization ,WIND turbines ,OCEAN currents ,MATHEMATICAL models ,NUMERICAL analysis ,SIMULATION methods & models - Abstract
Abstract: This paper uses Diffuser Augmented Wind Turbine for reference. According to the characteristics of ocean current movement, this paper gives several dome model programs for the straight blade vertical-axis tidal turbine. Make use of it to increase its output power. This paper gives several dome model programs for the straight blade vertical-axis tidal turbine. And optimum scheme is chosen by numerical simulation. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
5. Numerical and Experiment Research for Soft Coal under Condition of Blending Lignite.
- Author
-
Lv, Tai, Wang, Qian, and Leng, Jie
- Subjects
NUMERICAL analysis ,LIGNITE ,MIXING ,MATHEMATICAL models ,COAL combustion ,SIMULATION methods & models ,TEMPERATURE effect - Abstract
Abstract: The paper adopts standard
k−ɛ turbulence model and other mathematical models, and completing the blending lignite combustion numerical simulation of 600 MW boiler of one power plant. Three conditions were simulated in this paper, and these three conditions were compared and analyzed, the basic conclusion is consistent with the test. The result shows that the combustion character of blending lignite is lower than burning soft coal. Burning lignite shows a decline furnace temperature, and the simulation results are consistent with the experimental results. Pay attention to adjust the reasonable operating manner, and the operation is safety and economic. At the same time this paper also provides a useful reference for researching tangentially fired boiler furnace process. [Copyright &y& Elsevier]- Published
- 2012
- Full Text
- View/download PDF
6. The Generation of New Words Prevailing on the Internet and Its Revelation to the Innovation Environment Cultivation.
- Author
-
Zhiwei, Yu
- Subjects
COMPUTER networks ,INTERNET users ,TECHNOLOGICAL innovations ,MATHEMATICAL models ,VIRTUAL reality ,AMUSEMENTS - Abstract
Abstract: With the widespread popularity and application of the network, the new words appear on the internet one after another. The research on the generation of new words on the network has been a revelation to the innovation environment cultivation. This paper summarizes the type and the producing process of the new words on the internet, analyzes the innovation environment of new words on the network, and builds an innovation environment model of new words on the network from network environment, the structure of the internet users, the entertainment and virtual features of the network communication. On the basis of it, the paper discusses the innovation environment building in the context of the network and proposes to create a broad-based participation, free exchange, and timely sharing and dissemination innovation environment. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
7. Efficient Context Modeling Using OWL in Mobile Cloud Computing.
- Author
-
Changboka, Chang, Hyokyung, Ahn, Hyosik, and Choi, Euiin
- Subjects
CLOUD computing ,CELL phones ,INFORMATION technology ,MOBILE apps ,INFORMATION processing ,MATHEMATICAL models ,SMARTPHONES ,COMPUTER users - Abstract
Abstract: Mobile Cloud Computing has become as a new IT paradigm because of the growth of mobile device like smartphone and appearance of Cloud Computing environment. This mobile cloud environment provides various services and IT resources according to users’ requests, so an effective management of service and IT resources is required. Hence, this paper designs a context model based on ontology in mobile cloud computing in order to provide distributed IT resources and services to users based on context-awareness information. As the context model proposed in this paper uses context-aware information, it enables to provide more accurate personalized services and manage distributed IT resources. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
8. Analysis on Three-Dimensional Numerical Simulation of Turbine Flow Characteristics.
- Author
-
Jianhong, Fu, Kexiong, Song, Zhi, Zhang, Zhiqiang, Zhao, Dezhi, Zeng, Fei, Liu, and Xin, Zheng
- Subjects
TURBINES ,THREE-dimensional display systems ,COMPUTER simulation ,MATHEMATICAL models ,COMPUTATIONAL fluid dynamics ,VISCOSITY ,PARAMETER estimation - Abstract
Abstract: By the use of modelling software, this paper set up the three-dimensional physical model of single-stage turbine and guided it into the pre-process software. After meshing the turbine flow channel, simulating the mud flow characteristics in Turbine with CFD, and calculating the pressure drawdown at the inlet/outlet and the pressure distributions in single-stage turbine. Such results indicate that the pressure drawdown of single-stage turbine is influenced by the mud discharge capacity, drilling fluid density and viscosity. The pressure drop increases with the augment of mud discharge, which is approximately linear. There are significantly positive correlations between the pressure drawdown and the increase of mud density. The research in the paper provides reliable guidance in turbine flow channel design and the drilling technological parameters optimizing. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
9. Fuzzy Entropy Clustering Approach to Evaluate the Reliability of Emergency Logistics System.
- Author
-
Gong, Bengang, Chen, Xiang, and Hu, Chaozhong
- Subjects
FUZZY logic ,BUSINESS logistics ,ENTROPY (Information theory) ,RELIABILITY in engineering ,MATHEMATICAL models ,CLUSTER analysis (Statistics) - Abstract
Abstract: Because of burstiness, weak economy, time-uncertain of emergency logistics system, the paper constructs the operation model and its evaluation index system for emergency logistics system. In view of the imperfection of subjective determining index weight method in traditional evaluation, the index weight coefficients are determined by information entropy method of combining subjective judgment with objective evaluation. Then the fuzzy clustering and information entropy to determine the weights are used into emergency logistics system reliability evaluation. Finally the paper obtains a specific solution steps based on an example. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
10. Pose Accuracy Calibration of a Serial Five DOF Robot.
- Author
-
Yin, Jian and Gao, Yu
- Subjects
CALIBRATION ,ROBOTS ,PERFORMANCE evaluation ,DEGREES of freedom ,MEASUREMENT errors ,KINEMATICS ,MATHEMATICAL models ,PARAMETER estimation - Abstract
Abstract: Robot is widely used in industrial domain and pose accuracy of end-effector is an important indicator for judging robot performance. Calibration is a necessary for operating industrial robot and an effective and efficient means of accuracy improvement. This paper describes the development of a calibration procedure for a five degree of freedom serial robot using the laser tracker. The main goal of this paper is to utilize measurements relative to the end-effector of the robot to compensate errors. The robot kinematic model is computed to help identify the deviations. Robot parameter deviations can be identified so that the nominal parameters can be corrected. The experimental results are validated effectively. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
11. Over-excitation Relaying for Digital Generator Protection using the 765 kV Power System Modeling Data in Korea.
- Author
-
Won, Park Chul and Hyeon, Ban Woo
- Subjects
ELECTRIC generators ,AIR conditioning ,ALGORITHMS ,DENSITY functionals ,SIMULATION methods & models ,ELECTRONIC excitation ,ELECTRIC power ,MATHEMATICAL models - Abstract
Abstract: A large AC generator is an important component of the power system. Researches on the AC generator relaying for the next-generation ECMS and an efficient operation of protection control system are necessary. These require developments on detailed generator modeling and internal fault analysis, and prototyping for multifunctional IED device dedicated to next-generation production. In this paper, over-excitation relaying algorithm is one of the main protection elements which have an important role in DGPS(Digital Generator Protection System), was proposed. This paper first briefly introduces a principles of over-excitation and DFT-based gain compensation algorithm was adopted for the frequency measurement. Subsequently, protection scheme of over-excitation was presented. The 765[kV] modeling data of South Korea using EMTP-RV was used for simulations. The simulation result of over-excitation relaying are also provided. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
12. Simulation of High Temperature Air Combustion with modified Eddy-Break-Up combustion model.
- Author
-
Su, Yaxin, Chen, Cuiwu, and Su, Along
- Subjects
COMBUSTION ,HIGH temperatures ,COMPUTATIONAL fluid dynamics ,FLAME ,REYNOLDS stress ,ENERGY consumption ,SIMULATION methods & models ,MATHEMATICAL models - Abstract
Abstract: The numerical modeling of High Temperature Air Combustion (HTAC) could correctly predict the flame and emission characteristics so far, however, the precision is not satisfactory. In this paper, a parameter-modified Eddy-Break-Up (EBU) model with a three-step reaction scheme was used to simulate the HTAC process in a furnace of 2m ×2m×6.25m. Reynolds stress model (RSM) is used for the computational fluid dynamics (CFD) simulation. Comparison between experimental data from published papers, the original and modified EBU combustion models demonstrates that a smaller coefficient ‘A’ in the volumetric fuel consumption rate of the EBU model could improve the modelling precision. When ‘A’ is modified to be 1 other than its original value, 4, in the EBU model, the modeling could give improved results of the local distribution of CH4, temperature and NO emission. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
13. A 3-subarray DOA estimation method based on phase difference measurement for multi-beam bathymetry sonar.
- Author
-
Liu, Xiao, Li, Haisen, and Zhou, Tian
- Subjects
DIRECTION of arrival estimation ,SONAR ,MULTIBEAM mapping ,CROSS correlation ,MATHEMATICAL models ,COMPUTER simulation - Abstract
Abstract: Multi-beam bathymetry sonar is one of the current important equipments for seafloor bathymetry information detection. This paper extends the phase center cross-correlation method (PCCCT) which is successfully used in a 3- row bathymetric sidescan sonar to multi-beam bathymetry sonar, and a 3-subarray Direction-of-Arrival (DOA) estimation method based on phase difference measurement is proposed. A comparison with the split-beam DOA estimation method which is commonly used in multi-beam bathymetry sonar is employed. The paper analyzes the basic principle of the new method in details, and derives its mathematical model expression. The performance analysis is accomplished in theory. Computer simulation data is processed, and the results show that the 3-subarray DOA estimation method is effective and practical for multi-beam bathymetry sonar. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
14. Bidirectional Adaptations Workflow Management for the Route-choice Application.
- Author
-
Yang, Lei and Cao, Yang
- Subjects
WORKFLOW ,ROUTE choice ,BIDIRECTIONAL associative memories (Computer science) ,ALGORITHMS ,INFORMATION processing ,MATHEMATICAL models - Abstract
Abstract: This paper tries to widen the notion of adaptation to take account of bidirectional adaptations between the context and activities so as to ensure not only the activity adaptation but also the adaptation of the context of the user to the requirements of the activities. What''s more, this paper presents a bidirectional adaptations workflow management algorithm (BAWM) for the route-choice of campus navigation, which can dynamically adjust workflow execution behaviors based on current context information and the user activities. This paper also manages to show that the correctness of the BAWM algorithm by formulating it as a Petri-net model. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
15. Craniofacial Features 3D Digital Analysis Method.
- Author
-
He, Lei, Dong, Jian-min, and Sun, Yi
- Subjects
FEATURE extraction ,THREE-dimensional imaging ,ERROR analysis in mathematics ,MATHEMATICAL models ,ACQUISITION of data - Abstract
Abstract: This paper introduces the craniofacial data acquisition, three-dimensional reconstruction, the method of the distance measurement, angle measurement, area measurement and volume measurement of the threedimensional model of craniofacial, based on the project of ‘The Tibetan craniofacial databases and quantitative analysis method’. The innovation of the paper is adopting a standard part in the process of data collection so as to provide a reference for measurement and error analysis. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
16. Bayesian Fusion Method in Different Overall Distribution Between Prior Data and Field Data.
- Author
-
Xian-ming, Shi, Quan, Shi, Chun-liang, Chen, and Xiao-long, Huang
- Subjects
DATA distribution ,BAYESIAN analysis ,CONSTRAINT satisfaction ,PARAMETER estimation ,MATHEMATICAL models ,DATA fusion (Statistics) - Abstract
Abstract: Bayesian method is good to improve precision and earn cost, but it would be constrain to use in situation of field data be different with prior data in overall distribution, as generally change model or give up Bayesian method in this situation. In this paper, with consideration of physical connection of prior data and field data, thoughts of using Bayesian fusion method in different overall distribution between prior data and field data was developed, which was from 3 conditions of function of prior data and field data: distribution form and parameters were known, parameter had prior distribution and only distribution form were know. At last, an example was given to explain the usage method promoted by this paper. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
17. The Design and Implementation of an Information Management System Based on Embedded Linux OS.
- Author
-
Aiguo, Ji, Lei, Xie, Zhiwei, Zhang, and Xincai, Wang
- Subjects
SYSTEMS design ,INFORMATION resources management ,EMBEDDED computer systems ,LINUX operating systems ,GRAPHICAL user interfaces ,MATHEMATICAL models - Abstract
Abstract: The efficiency and maturity of the information management system development environment in embedded Linux OS are not convenient for programmer. This paper synthesizes the technologies including memory-share, miniGUI and expat, and presents a complete information management system frame in embedded Linux OS. The reference model in this paper satisfies the design and implementation of an information management system based on embedded Linux OS. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
18. A kind of user behavior authentication model and analysis in cloud computing.
- Author
-
Tian, Li-Qin, Lin, Chuang, Yang, Ni, and Duxiujuan
- Subjects
COMPUTER access control ,MATHEMATICAL models ,CLOUD computing ,COMPUTER security ,COMPUTER software ,ALGORITHMS ,INTERNET users ,PETRI nets - Abstract
Abstract: Currently, the cloud computing is welcome in scholars and enterprise, because of its good features such as low investment, easy maintenance, Flexibility and fast deployment, reliable service. However, when the cloud computing is implemented, the security and credibility is one of the biggest obstacles. In cloud computing, users directly use and operate software of cloud service providers, operating system, even programming environment and network infrastructure, so the impact and breakage users caused for cloud software and hardware resources more serious than the current Internet users to share resources. So whether the behavior and behavior subject is credible or not, how to authenticate and control user behavior, these are important parts of the cloud computing study. This paper presents the concept of user behavior authentication, discusses how to authenticate and control user behavior in the cloud computing environment according to the user''s behavior, include establishment of behavior authentication set, mechanisms of behavior authentication and control, corresponding mode of Stochastic Petri Nets, False Negative rates and algorithm performance etc. Paper lays the theoretical and practical foundation for the real application of cloud computing. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
19. Research of Ed2k-based Initiative Special Information Monitoring Model.
- Author
-
Ding, Junping and Cai, Wandong
- Subjects
COMPUTER networks ,PEER-to-peer architecture (Computer networks) ,MATHEMATICAL models ,INFORMATION theory ,FEASIBILITY studies ,ELECTRONIC data processing ,TELECOMMUNICATION traffic - Abstract
Abstract: In order to monitor the specific information of Ed2k-based network, this paper, based on the currently P2P traffic identification and Ed2k-based network, established an initiative monitoring model in view of specific information eMule-based Ed2k network. This model, based on the specific information which to be monitored, Ed2k network adopts the initiative detection and pseudo-client technology to repeatedly detect Ed2k practical audience information, and then gets the audience information related with specific information. Then mathematically statistically analyzes the obtained audience information to determine the disseminative trend of specific information in Ed2k network; and provides data support for specific information pre-warning or forecasting. Finally, this paper proved the feasibility and effectiveness of the proposed monitoring model by the achieved system. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
20. Research of Virtual Reality Modeling using VRML.
- Author
-
Guo, Hao
- Subjects
VIRTUAL reality ,MATHEMATICAL models ,VRML (Computer program language) ,JAVA programming language ,INTERNET ,THREE-dimensional imaging - Abstract
Abstract: With the Internet and virtual reality (virtual reality) technology, Web3D technology is generated; its aim is the Internet-based three-dimensional virtual world.VRML Virtual reality modeling language is the most widely used application on web3D three-dimensional scene description language. VRML''s shortcomings are just a description language with the lack of complex behavior and interactive programming support.Combined with the virtual environment, this paper establishes the integrated application of Java3D and VMRL build Web-based virtual environment application framework. Meanwhile, the paper also analyzes the technical features of VRML and Java3D, which gives VMRL and application in a virtual environment Jav3aD on some implementation details. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.