3,281 research outputs found

    New features and applications of PRESTO, a computer code for the performance of regenerative, superheated steam turbine cycles

    Get PDF
    The code was designed to analyze performance at valves-wide-open design flow. The code can model conventional steam cycles as well as cycles that include such special features as process steam extraction and induction and feedwater heating by external heat sources. Convenience features and extensions to the special features were incorporated into the PRESTO code. The features are described, and detailed examples illustrating the use of both the original and the special features are given

    Implementation of control point form of algebraic grid-generation technique

    Get PDF
    The control point form (CPF) provides explicit control of physical grid shape and grid spacing through the movement of the control points. The control point array, called a control net, is a space grid type arrangement of locations in physical space with an index for each direction. As an algebraic method CPF is efficient and works well with interactive computer graphics. A family of menu-driven, interactive grid-generation computer codes (TURBO) is being developed by using CPF. Key features of TurboI (a TURBO member) are discussed and typical results are presented. TurboI runs on any IRIS 4D series workstation

    Dynamics of axial separation in long rotating drums

    Full text link
    We propose a continuum description for the axial separation of granular materials in a long rotating drum. The model, operating with two local variables, concentration difference and the dynamic angle of repose, describes both initial transient traveling wave dynamics and long-term segregation of the binary mixture. Segregation proceeds through ultra-slow logarithmic coarsening.Comment: 4 pages, 3 Postscript figures; submitted to PR

    Thermophysical and elastic properties of Cu50Zr50 and (Cu50Zr50)95Al5 bulk-metallic-glass-forming alloys

    Get PDF
    By employing a containerless high-temperature high-vacuum electrostatic levitation technique, the thermophysical properties, including the ratio between the specific heat capacity and the hemispherical total emissivity, the specific volume, and the viscosity, of Cu50Zr50 and (Cu50Zr50)95Al5 bulk-metallic-glass (BMG)-forming liquids have been measured. Compared with Cu50Zr50, the improved glass-forming ability of (Cu50Zr50)95Al5 can be attributed to its dense liquid structure and its high value of viscosity. Additionally, the relationship between the viscosity of various BMG forming liquids at the melting temperature and the elastic properties of the corresponding glasses at room temperature will be compared

    Chemical Raman Enhancement of Organic Adsorbates on Metal Surfaces

    Get PDF
    Using a combination of first-principles theory and experiments, we provide a quantitative explanation for chemical contributions to surface-enhanced Raman spectroscopy for a well-studied organic molecule, benzene thiol, chemisorbed on planar Au(111) surfaces. With density functional theory calculations of the static Raman tensor, we demonstrate and quantify a strong mode-dependent modification of benzene thiol Raman spectra by Au substrates. Raman active modes with the largest enhancements result from stronger contributions from Au to their electron-vibron coupling, as quantified through a deformation potential, a well-defined property of each vibrational mode. A straightforward and general analysis is introduced that allows extraction of chemical enhancement from experiments for specific vibrational modes; measured values are in excellent agreement with our calculations.Comment: 5 pages, 4 figures and Supplementary material included as ancillary fil

    LiPISC: A Lightweight and Flexible Method for Privacy-Aware Intersection Set Computation

    Get PDF
    Privacy-aware intersection set computation (PISC) can be modeled as secure multi-party computation. The basic idea is to compute the intersection of input sets without leaking privacy. Furthermore, PISC should be sufficiently flexible to recommend approximate intersection items. In this paper, we reveal two previously unpublished attacks against PISC, which can be used to reveal and link one input set to another input set, resulting in privacy leakage. We coin these as Set Linkage Attack and Set Reveal Attack. We then present a lightweight and flexible PISC scheme (LiPISC) and prove its security (including against Set Linkage Attack and Set Reveal Attack)

    Fuzzy identity-based data integrity auditing for reliable cloud storage systems

    Get PDF
    This is the author accepted manuscript. The final version is available from the publisher via the DOI in this record.As a core security issue in reliable cloud storage, data integrity has received much attention. Data auditing protocols enable a verifier to efficiently check the integrity of the outsourced data without downloading the data. A key research challenge associated with existing designs of data auditing protocols is the complexity in key management. In this paper, we seek to address the complex key management challenge in cloud data integrity checking by introducing fuzzy identity-based auditing-the first in such an approach, to the best of our knowledge. More specifically, we present the primitive of fuzzy identity-based data auditing, where a user’s identity can be viewed as a set of descriptive attributes. We formalize the system model and the security model for this new primitive. We then present a concrete construction of fuzzy identity-based auditing protocol by utilizing biometrics as the fuzzy identity. The new protocol offers the property of error-tolerance, namely, it binds private key to one identity which can be used to verify the correctness of a response generated with another identity, if and only if both identities are sufficiently close. We prove the security of our protocol based on the computational Diffie-Hellman assumption and the discrete logarithm assumption in the selective-ID security model. Finally, we develop a prototype implementation of the protocol which demonstrates the practicality of the proposal.This work is supported by the National Natural Science Foundation of China (61501333,61300213,61272436,61472083), the Fundamental Research Funds for the Central Universities under Grant ZYGX2015J05
    • …
    corecore