304 research outputs found

    A New Extension of Wray-Agarwal Wall Distance Free Turbulence Model to Rough Wall Flows

    Get PDF
    This paper provides a roughness correction to the latest version of Wall-Distance-Free Wray-Agarwal (WA) one equation turbulence model (WA2018). The results from WA 2018 rough wall model are compared to Spalart-Allmaras model and the previous version of WA roughness model (WA2017). The results from WA2018-Rough model for flow over a flat plate show substantial improvement from the previous version WA2017-Rough and a good agreement with a semi-empirical formula based on experimental results. For flow past a S809 airfoil with surface roughness, WA2018-Rough model performs quite well compared to SA-Rough model

    A Value Function Approach to Information Operations MOE\u27s: A Preliminary Study

    Get PDF
    A value focused thinking approach is applied to information operations. A preliminary value hierarchy for information operations is constructed by extracting the values of senior military leadership from existing doctrine. To identify these key values for information operations, applicable existing doctrine was reviewed and summarized. Additionally, hierarchical representations of the values represented within each reviewed doctrine are developed. A value hierarchy requires that supporting objectives be mutually exclusive and collectively exhaustive. Within this analysis, these requirements are enforced, in part, by developed definitions which serve as tests to maintain mutual exclusivity. An exhaustive set of supporting values is also guaranteed by identifying a spanning set of values that directly support the overall objective of information operations. This preliminary value hierarchy serves as the basis for continuing research. The implications for this research include the construction of a prescriptive model in which the effectiveness of current and future systems can be assessed on a common scale. Further, the effectiveness of developing technologies can be assessed and the value of these technologies determined with respect to the values of senior military leadership. With this, the value of holes in our suite of information warfare systems can also be assessed in terms of their effectiveness in fulfilling the values of military leadership

    Tomosipo: fast, flexible, and convenient 3D tomography for complex scanning geometries in Python

    Get PDF
    Tomography is a powerful tool for reconstructing the interior of an object from a series of projection images. Typically, the source and detector traverse a standard path (e.g., circular, helical). Recently, various techniques have emerged that use more complex acquisition geometries. Current software packages require significant handwork, or lack the flexibility to handle such geometries. Therefore, software is needed that can concisely represent, visualize, and compute reconstructions of complex acquisition geometries. We present tomosipo, a Python package that provides these capabilities in a concise and intuitive way. Case studies demonstrate the power and flexibility of tomosipo

    Facilitating the analysis of a UK national blood service supply chain using distributed simulation

    Get PDF
    In an attempt to investigate blood unit ordering policies, researchers have created a discrete-event model of the UK National Blood Service (NBS) supply chain in the Southampton area of the UK. The model has been created using Simul8, a commercial-off-the-shelf discrete-event simulation package (CSP). However, as more hospitals were added to the model, it was discovered that the length of time needed to perform a single simulation severely increased. It has been claimed that distributed simulation, a technique that uses the resources of many computers to execute a simulation model, can reduce simulation runtime. Further, an emerging standardized approach exists that supports distributed simulation with CSPs. These CSP Interoperability (CSPI) standards are compatible with the IEEE 1516 standard The High Level Architecture, the defacto interoperability standard for distributed simulation. To investigate if distributed simulation can reduce the execution time of NBS supply chain simulation, this paper presents experiences of creating a distributed version of the CSP Simul8 according to the CSPI/HLA standards. It shows that the distributed version of the simulation does indeed run faster when the model reaches a certain size. Further, we argue that understanding the relationship of model features is key to performance. This is illustrated by experimentation with two different protocols implementations (using Time Advance Request (TAR) and Next Event Request (NER)). Our contribution is therefore the demonstration that distributed simulation is a useful technique in the timely execution of supply chains of this type and that careful analysis of model features can further increase performance

    Carbon taxation and feed-in tariffs: evaluating the effect of network and market properties on policy effectiveness

    Get PDF
    This paper evaluates how the effect of introducing a carbon emission tax and/or feed-in tariffs on capacity expansion decisions of generating companies varies depending on the number and size of competing firms and technical conditions of the network. To do so, it uses a Nash–Cournot model of the electricity market. This model is then applied to the IEEE 6-bus network. We study three cases: one with only a carbon tax consistent with current carbon prices; one with only a feed-in tariff consistent with current US levels, and one with simultaneous carbon taxation and feed-in tariff. We show that, at least in our case, the quantity of renewable capacity expansion and the electricity prices depend more significantly on the technical conditions of the network and the number of competitors in the market than it depends on the presence of economic penalties or incentives. We also show how interactions between imperfectly competitive markets and physical networks can produce counterintuitive results, such as an increase in consumer prices as a result of a reduction in network congestion. Our results imply that no two countries would experience the same effects from a policy on carbon tax and feed-in tariff if their electricity market does not have similarities in technical and competitive conditions

    Estimating potential incidence of MERS-CoV associated with Hajj pilgrims to Saudi Arabia, 2014

    Get PDF
    Between March and June 2014 the Kingdom of Saudi Arabia (KSA) had a large outbreak of MERS-CoV, renewing fears of a major outbreak during the Hajj this October. Using KSA Ministry of Health data, the MERS-CoV Scenario and Modeling Working Group forecast incidence under three scenarios. In the expected incidence scenario, we estimate 6.2 (95% Prediction Interval [PI]: 1-17) pilgrims will develop MERS-CoV symptoms during the Hajj, and 4.0 (95% PI: 0-12) foreign pilgrims will be infected but return home before developing symptoms. In the most pessimistic scenario, 47.6 (95% PI: 32-66) cases will develop symptoms during the Hajj, and 29.0 (95% PI: 17-43) will be infected but return home asymptomatic. Large numbers of MERS-CoV cases are unlikely to occur during the 2014 Hajj even under pessimistic assumptions, but careful monitoring is still needed to detect possible mass infection events and minimize introductions into other countries

    Assessing and augmenting SCADA cyber security: a survey of techniques

    Get PDF
    SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability

    How successful is successful? Aortic arch shape after successful aortic coarctation repair correlates with left ventricular function

    Get PDF
    OBJECTIVES: Even after successful aortic coarctation repair, there remains a significant incidence of late systemic hypertension and other morbidities. Independently of residual obstruction, aortic arch morphology alone may affect cardiac function and outcome. We sought to uncover the relationship of arch 3-dimensional shape features with functional data obtained from cardiac magnetic resonance scans. METHODS: Three-dimensional aortic arch shape models of 53 patients (mean age, 22.3 ± 5.6 years) 12 to 38 years after aortic coarctation repair were reconstructed from cardiac magnetic resonance data. A novel validated statistical shape analysis method computed a 3-dimensional mean anatomic shape of all aortic arches and calculated deformation vectors of the mean shape toward each patient's arch anatomy. From these deformations, 3-dimensional shape features most related to left ventricular ejection fraction, indexed left ventricular end-diastolic volume, indexed left ventricular mass, and resting systolic blood pressure were extracted from the deformation vectors via partial least-squares regression. RESULTS: Distinct arch shape features correlated significantly with left ventricular ejection fraction (r = 0.42, P = .024), indexed left ventricular end-diastolic volume (r = 0.65, P < .001), and indexed left ventricular mass (r = 0.44, P = .014). Lower left ventricular ejection fraction, larger indexed left ventricular end-diastolic volume, and increased indexed left ventricular mass were identified with an aortic arch shape that has an elongated ascending aorta with a high arch height-to-width ratio, a relatively short proximal transverse arch, and a relatively dilated descending aorta. High blood pressure seemed to be linked to gothic arch shape features, but this did not achieve statistical significance. CONCLUSIONS: Independently of hemodynamically important arch obstruction or residual aortic coarctation, specific aortic arch shape features late after successful aortic coarctation repair seem to be associated with worse left ventricular function. Analyzing 3-dimensional shape information via statistical shape modeling can be an adjunct to long-term risk assessment in patients after aortic coarctation repair
    corecore