1,519 research outputs found

    An experimental study of near wall flow parameters in the blade end-wall corner region

    Get PDF
    The near wall flow parameters in the blade end-wall corner region is investigated. The blade end-wall corner region was simulated by mounting an airfoil section (NACA 65-015 base profile) symmetric blades on both sides of the flat plate with semi-circular leading edge. The initial 7 cm from the leading edge of the flat plate was roughened by gluing No. 4 floor sanding paper to artificially increase the boundary layer thickness on the flat plate. The initial flow conditions of the boundary layer upstream of the corner region are expected to dictate the behavior of flow inside the corner region. Therefore, an experimental investigation was extended to study the combined effect of initial roughness and increased level of free stream turbulence on the development of a 2-D turbulent boundary layer in the absence of the blade. The measurement techniques employed in the present investigation included, the conventional pitot and pitot-static probes, wall taps, the Preston tube, piezoresistive transducer and the normal sensor hot-wire probe. The pitot and pitot-static probes were used to obtain mean velocity profile measurements within the boundary layer. The measurements of mean surface static pressure were obtained with the surface static tube and the conventional wall tap method. The wall shear vector measurements were made with a specially constructed Preston tube. The flush mounted piezoresistive type pressure transducer were employed to measure the wall pressure fluctuation field. The velocity fluctuation measurements, used in obtaining the wall pressure-velocity correlation data, were made with normal single sensor hot-wire probe. At different streamwise stations, in the blade end-wall corner region, the mean values of surface static pressure varied more on the end-wall surface in the corner region were mainly caused by the changes in the curvature of the streamlines. The magnitude of the wall shear stress in the blade end-wall corner region increased significantly in the close vicinity of the corner line. The maximum value of the wall shear stress and its location from the corner line, on both the surfaces forming the corner region, were observed to change along the corner. These observed changes in the maximum values of the wall shear stress and its location from the corner line could be associated with the stretching and attenuation of the horseshoe vortex. The wall shear stress vectors in the blade end-wall corner region were observed to be more skewed on the end-wall surface as compared to that on the blade surface. The differences in the wall shear stress directions obtained with the Preston tube and flow visualization method were within the range in which the Preston tube was found to be insensitive to the yaw angle

    Overcoming Recession through Effective Business Communication Approaches (A Study in Indian Scenario)

    Get PDF
    No business activity can be completed without effective business communication network. The stage of economic turmoil is the most important time for any organization to regroup its strategy. At this juncture, strong, transparent and constant internal and external communication networks play a vital role. The global meltdown is a blessing in disguise for the organizations to invigorate their business communication network. The present paper aims to study multifarious approaches of Business Communication applied by Indian Organizations to combat the turbulent period of recession in a successful manner.

    Toward a more generalizable blood RNA signature for bacterial and viral infections

    Get PDF
    Host-response profiles can discriminate different infections. A new 8-gene blood RNA signature to discriminate bacterial and viral infections extends our focus hitherto on the case mix from the US and Europe to include that of low- and middle-income countries.1 Challenges remain

    Bianchijevi modeli tipa V u samotvornoj kozmologiji sa stalnim parametrom usporavanja

    Get PDF
    We study the Bianchi type-V cosmological model filled with perfect fluid in Barber\u27s second self-creation theory by assuming a special law of variation for Hubble\u27s parameter that yield a constant value of deceleration parameter. Some physical consequences of the model have been discussed in case of Zel\u27dovich fluid and radiation era.Proučavamo Bianchijev kozmološki model svemira tipa V ispunjenog perfektnom tekućinom u Barberovoj samotvornoj teoriji, pretpostavljajući poseban zakon o ovisnosti Hubbleovog parametra što daje stalnu vrijednost parametra usporavanja. Raspravljamo neke ishode modela za Zel’dovichevu tekućinu i za doba zračenja

    Bianchijevi modeli tipa V u samotvornoj kozmologiji sa stalnim parametrom usporavanja

    Get PDF
    We study the Bianchi type-V cosmological model filled with perfect fluid in Barber\u27s second self-creation theory by assuming a special law of variation for Hubble\u27s parameter that yield a constant value of deceleration parameter. Some physical consequences of the model have been discussed in case of Zel\u27dovich fluid and radiation era.Proučavamo Bianchijev kozmološki model svemira tipa V ispunjenog perfektnom tekućinom u Barberovoj samotvornoj teoriji, pretpostavljajući poseban zakon o ovisnosti Hubbleovog parametra što daje stalnu vrijednost parametra usporavanja. Raspravljamo neke ishode modela za Zel’dovichevu tekućinu i za doba zračenja

    Cloud Computing Security with Identity-Based Authentication Using Heritage-Based Technique

    Full text link
    More organizations start to give various types of distributed computing administrations for Internet clients in the meantime these administrations additionally bring some security issues. Presently the many of cloud computing systems endow digital identity for clients to access their services, this will bring some drawback for a hybrid cloud that includes multiple private clouds and/or public clouds. Today most cloud computing framework use asymmetric and traditional public key cryptography to give information security and common authentication. Identity-based cryptography has some attraction attributes that appear to fit well the necessities of cloud computing. In this paper, by receiving federated identity management together with hierarchical identity-based cryptography (HIBC) with cloud heritage technique, not only the key distribution but also the mutual validation can be rearranged in the cloud

    STUDY AND MECHANICAL TESTING OF FIBER REINFORCED PLASTIC LAMINATE AND CARBON FIBER LAMINATE COMPOSITE

    Full text link
    The use of composite materials at industrial and domestic levels is increasing day by day, due to which the work in the direction of enhancing its mechanical property is being on a fast pace. In this study, the mechanical properties of Polyester resin and Carbon Fibre Composite were analyzed experimentally. Tensile and Compressive strength of the specimen were determined and compared. It was found both laminates together provides a positive impact in the enhancement of mechanical properties of the composite

    Effect of Mineral Supplementation on Rumen Metabolites and Enzymes in Sheep Fed Sorghum Stover Based Diets

    Get PDF
    Supplementation of area specific mineral mixture (ASMM) containing Ca, P, Na, Cu, and Zn to producing animals showed noticeable improvement in growth, milk production and reproductive performances. However, there was paucity of information on rumen metabolites and enzymes in animals supplemented with ASMM. Therefore, the present investigation was conducted to study the effect of mineral supplementation (ASMM) on rumen metabolites and enzymes in sheep fed sorghum stover based diets
    • …
    corecore