12,215 research outputs found

    Numerical Investigation on Flow Separation Control of Low Reynolds Number Sinusoidal Aerofoils

    Get PDF
    The paper presents a computational analysis of the characteristics of a NACA 634- 021 aerofoil incorporated with sinusoidal leading-edge protuberances at Re = 14,000. The protuberances are characterized by an amplitude and wavelength of 12% and 50% of the aerofoil chord length respectively. An unsteady Reynolds Average Navier Stokes (RANS) analysis of the full-span aerofoils was carried out using Transition SST (Shear Stress Transport) turbulence model across five different angles-of-attack (AOA). Comparisons with previous experimental results reported good qualitative agreements in terms of flow separation when the aerofoils are pitched at higher AOAs. Results presented here comprised of near-wall flow visualizations of the flow separation bubble at the peaks and troughs of the protuberances. Additionally, results indicate that the aerofoil with leading-edge protuberances displayed distinctive wall shear streamline and iso-contour characteristics at different span-wise positions. This implies that even at a low Reynolds number, implementations of these leading-edge protuberances could have positive or adverse effects on flow separation

    Fitting models of multiple hypotheses to partial population data: investigating the causes of cycles in red grouse

    Get PDF
    There are two postulated causes for the observed periodic fluctuations (cycles) in red grouse (Lagopus lagopus scoticus). The first involves interaction with the parasitic nematode Trichostrongylus tenuis. The second invokes delayed regulation through the effect of male aggressiveness on territoriality. Empirical evidence exists to support both hypotheses, and each hypothesis has been modeled deterministically. However, little effort has gone into looking at the combined effects of the two mechanisms or formally fitting the corresponding models to field data. Here we present a model for red grouse dynamics that includes both parasites and territoriality. To explore the single and combined hypotheses, we specify three versions of this model and fit them to data using Bayesian state‐space modeling, a method that allows statistical inference to be performed on mechanistic models such as ours. Output from the three models is then examined to determine their goodness of fit and the biological plausibility of the parameter values required by each to fit the population data. While all three models are capable of emulating the observed cyclic dynamics, only the model including both aggression and parasites does so under consistently realistic parameter values, providing theoretical support for the idea that both mechanisms shape red grouse cycles

    Providing secure remote access to legacy applications

    Get PDF
    While the widespread adoption of Internet and Intranet technology has been one of the exciting developments of recent years, many hospitals are finding that their data and legacy applications do not naturally fit into the new methods of dissemination. Existing applications often rely on isolation or trusted networks for their access control or security, whereas untrusted wide area networks pay little attention to the authenticity, integrity or confidentiality of the data they transport. Many hospitals do not have the resources to develop new ''network-ready'' versions of existing centralised applications. In this paper, we examine the issues that must be considered when providing network access to an existing health care application, and we describe how we have implemented the proposed solution in one healthcare application namely the diabetic register at Hope Hospital. We describe the architecture that allows remote access to the legacy application, providing it with encrypted communications and strongly authenticated access control but without requiring any modifications to the underlying application. As well as comparing alternative ways of implementing such a system, we also consider issues relating to usability and manageability, such as password management

    Initial Experiences of Building Secure Access to Patient Confidential Data via the Internet

    Get PDF
    A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care (hospital) diabetes information system, has been implemented. We describe the application that we chose to distribute (a diabetes register); the security mechanisms we used to protect the data (a public key infrastructure with strong encryption and digitally signed messages, plus a firewall); the reasons for the implementation decisions we made; the validation testing that we performed and the preliminary results of the pilot implementation

    The sleep cycle and subcortical-cortical EEG relations in the unrestrained chimpanzee

    Get PDF
    Sleep cycle and subcortical-cortical EEG relations in unrestrained chimpanze

    Characterisation of the dynamical quantum state of a zero temperature Bose-Einstein condensate

    Get PDF
    We describe the quantum state of a Bose-Einstein condensate at zero temperature. By evaluating the Q-function we show that the ground state of Bose-Einstein condensate under the Hartree approximation is squeezed. We find that multimode Schroedinger cat states are generated as the condensate evolves in a ballistic expansion.Comment: 13 pages, 6 figure
    corecore