Recent Progress in Unsteady and Pulsatile Flow Performance Analysis of Turbocharger Turbines

Author(s):  
Josiah L. Kwao-Ampomah ◽  
Weiling Zhuge ◽  
Yangjun Zhang

In this review, a summary and discussion of the current state of the art on computational and experimental analysis of unsteady flow effects on turbocharger turbine performance is presented. The numerical methods, for CFD analysis are first introduced and explained together with their unique advantages and limitations. Details on several approaches and test facilities used in experimental analysis of unsteady flow effects on turbine performance are compared and criticised. Conclusions of the results and discussion comprise recommendations for more accurate acquisition of data and justifications for future work needed in this field, including a twin entry volute design alteration that could reduce pulse energy loss.

Acta Numerica ◽  
2014 ◽  
Vol 23 ◽  
pp. 369-520 ◽  
Author(s):  
G. Dimarco ◽  
L. Pareschi

In this survey we consider the development and mathematical analysis of numerical methods for kinetic partial differential equations. Kinetic equations represent a way of describing the time evolution of a system consisting of a large number of particles. Due to the high number of dimensions and their intrinsic physical properties, the construction of numerical methods represents a challenge and requires a careful balance between accuracy and computational complexity. Here we review the basic numerical techniques for dealing with such equations, including the case of semi-Lagrangian methods, discrete-velocity models and spectral methods. In addition we give an overview of the current state of the art of numerical methods for kinetic equations. This covers the derivation of fast algorithms, the notion of asymptotic-preserving methods and the construction of hybrid schemes.


2013 ◽  
Vol 5 (1) ◽  
pp. 53-63 ◽  
Author(s):  
Alfredo Tirado-Ramos ◽  
Chris Kelley

Simulating the transmission of HIV requires a model framework that can account for the complex nature of HIV transmission. In this paper the authors present the current state of the art for simulating HIV with agent-based models and highlight some of the significant contributions of current research. The authors then propose opportunities for future work including their plan that involves identifying and monitoring high-risk drug users that can potentially initiate high-risk infection propagation networks.


2020 ◽  
Vol 2020 ◽  
pp. 1-14
Author(s):  
Mariano Di Martino ◽  
Peter Quax ◽  
Wim Lamotte

Zero-rating is a technique where internet service providers (ISPs) allow consumers to utilize a specific website without charging their internet data plan. Implementing zero-rating requires an accurate website identification method that is also efficient and reliable to be applied on live network traffic. In this paper, we examine existing website identification methods with the objective of applying zero-rating. Furthermore, we demonstrate the ineffectiveness of these methods against modern encryption protocols such as Encrypted SNI and DNS over HTTPS and therefore show that ISPs are not able to maintain the current zero-rating approaches in the forthcoming future. To address this concern, we present “Open-Knock,” a novel approach that is capable of accurately identifying a zero-rated website, thwarts free-riding attacks, and is sustainable on the increasingly encrypted web. In addition, our approach does not require plaintext protocols or preprocessed fingerprints upfront. Finally, our experimental analysis unveils that we are able to convert each IP address to the correct domain name for each website in the Tranco top 6000 websites list with an accuracy of 50.5% and therefore outperform the current state-of-the-art approaches.


2021 ◽  
pp. 147821032110627
Author(s):  
Petar Jandrić ◽  
Jeremy Knox

This article develops a post-determinist and a post-instrumentalist understanding of education and educational research through the lens of postdigital theory. We begin with historicizing current postdigital research by showing its intellectual ancestry and recognizing its rapidly changing nature. We move on to current state of the art, which we present in three wide themes. The first theme is the great convergence of various lower-level techno-scientific convergences, such as analogue–digital, physics–biology, and biology–information, which results in new epistemologies, ontologies and practices. The second theme is some consequences of the great convergence for education and pedagogy, which result in new postdigital ecopedagogies. The third theme is postdigital research, which is reconfigured by the great convergence towards a closer collaboration between traditional scientific fields and disciplines. We briefly outline four such reconfigurations (multidisciplinary, interdisciplinarity, transdisciplinarity, and antidisciplinarity) and their implications. The article concludes with a brief list of directions for future work in the field.


2013 ◽  
Vol 433-435 ◽  
pp. 1866-1870
Author(s):  
Yan Mei Chai ◽  
Su Wen Zhu ◽  
Wen Ying Han

The booming e-commerce industry is suffering from serious information security problems. As a potential and effective security solution, information hiding technology has been widely applied in many fields and drawn unprecedented attention. Based on our research, this paper provides a survey on the current state of the art information hiding technology, mainly covering the fundamental concepts, basic model, the recent progress of information hiding methods and its applications in e-commerce security sector. At last, possible research and development trends of information hiding technology are discussed.


2014 ◽  
Vol 14 (1) ◽  
pp. 172-182
Author(s):  
Velichko Dzhambov

Abstract This paper concerns high precision numerical computing of definite integrals in a specific environment, namely .NET Framework. The work is a part of a series, tracing the progress of creating tools for high precision computations in this environment and may be considered as a continuation, in this direction, of the beginning, described in [15], that includes special function calculations with arbitrary precision. Some of the methods used are described. The results are clearly illustrated with the help of an application, purposefully created, using the current state-of-the-art library being created for realization of functions and numerical methods of arbitrary precision in a given environment.


2016 ◽  
Vol 24 (4) ◽  
pp. 695-718 ◽  
Author(s):  
Stjepan Picek ◽  
Marko Cupic ◽  
Leon Rotim

Substitution Boxes (S-Boxes) play an important role in many modern-day cryptographic algorithms, more commonly known as ciphers. Without carefully chosen S-Boxes, such ciphers would be easier to break. Therefore, it is not surprising that the design of suitable S-Boxes attracts a lot of attention in the cryptography community. The evolutionary computation (EC) community also had several attempts using evolutionary paradigms to evolve S-Boxes with good cryptographic properties. This article focuses on a fitness function one should use when evolving highly nonlinear S-Boxes. After an extensive experimental analysis of the current state-of-the-art fitness functions, we present a new one that offers higher speed and better results when compared with the aforementioned fitness functions.


2014 ◽  
Vol 2014 ◽  
pp. 1-14 ◽  
Author(s):  
Paul A. Zandbergen

Public health datasets increasingly use geographic identifiers such as an individual’s address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.


2016 ◽  
Vol 22 (3) ◽  
pp. 364-407 ◽  
Author(s):  
Tim Taylor ◽  
Joshua E. Auerbach ◽  
Josh Bongard ◽  
Jeff Clune ◽  
Simon Hickinbotham ◽  
...  

We present a survey of the first 21 years of web-based artificial life (WebAL) research and applications, broadly construed to include the many different ways in which artificial life and web technologies might intersect. Our survey covers the period from 1994—when the first WebAL work appeared—up to the present day, together with a brief discussion of relevant precursors. We examine recent projects, from 2010–2015, in greater detail in order to highlight the current state of the art. We follow the survey with a discussion of common themes and methodologies that can be observed in recent work and identify a number of likely directions for future work in this exciting area.


Sign in / Sign up

Export Citation Format

Share Document