• Title/Summary/Keyword: Computational and experimental methods

Search Result 466, Processing Time 0.033 seconds

Determination of Cutting Orientation in Zigzag Milling Operationa: A Geometrical Approach;

  • Kim, Byeong Keuk;Park, Joon Young;Wee, Nam-Sook
    • Korean Journal of Computational Design and Engineering
    • /
    • v.2 no.3
    • /
    • pp.186-194
    • /
    • 1997
  • This paper describes new methods to minimize the cutting time in zigzag milling operation of two dimensional polygonal surfaces. Previous works have been focused on mainly experimental approaches by considering some machining parameters such as, spindle speed, depth of cut, cutter traverse rate, cutter diameter, number of teeth, tool wear, life of tool, and so on. However, in this study, we considered two geometrical factors one by one in order to see the effect separately, which are the length of cut and the number of cutter traverse. In an N-sided concave or convex polygon, an algorithm has been developed which minimize the total length of cut. Also, a heuristic approach was used to minimize the number of cutter traverse.

  • PDF

PREDICTION OF THE ORIFICE DISCHARGE COEFFICIENT USING COMPUTATIONAL FLUIDS DYNAMICS (전산유동해석을 이용한 ORIFICE 방출 계수 예측)

  • Ok, H.;Kim, I.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2006.10a
    • /
    • pp.147-150
    • /
    • 2006
  • Vent ports are installed on the walls of closed compartments of a launch vehicle to control the pressure drop in the compartments. The ports can be modelled as an orifice, and the accurate prediction of the discharge coefficient of an orifice is essential for the design of vent ports. Experimental methods have been used to determine the discharge coefficients for various shapes of orifices, and extensive databases are available. Wind tunnel tests have been also done to evaluate the effect of interaction between venting outflow and freestream for limited conditions. The goal of the present research is to predict the discharge coefficient of an orifice using CFD and evaluate the accuracy of the method, especially for the orifices exposed to the external flow.

  • PDF

Applications of Characteristic Boundary Conditions within CFDS Numerical Framework (CFDS기법에 연계된 특성경계조건에 응용성에 대한 소개)

  • Hong S. K.;Lee K. S.
    • Journal of computational fluids engineering
    • /
    • v.5 no.1
    • /
    • pp.43-59
    • /
    • 2000
  • Characteristic boundary conditions are discussed in conjunction with a flux-difference splitting formulation as modified from Roe's linearization. Details of how one can implement the characteristic boundary conditions which are made compatible with the interior point formulation are described for different types of boundaries including subsonic outflow and adiabatic wall. The validity of boundary conditions are demonstrated through computation of transonic airfoil, supersonic ogive-cylinder, hypersonic cylinder, and S-duct internal flows. The computed wall pressure distributions are compared with published experimental and computed data. Objectives of this paper are thus to give insight of formulation procedure of a flux-difference splitting method and to pave ways for other users to adopt present boundary procedure on their numerical methods.

  • PDF

COMPUTATIONAL STUDY ON TWO DIMENSIONAL DAM BREAKING SIMULATION USING LATTICE BOLTZMANN METHOD (LBM을 이용한 Dam Breaking 수치해석 연구)

  • Jung, Rho-Taek;Hasan, Md. Kamrul
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2011.05a
    • /
    • pp.54-57
    • /
    • 2011
  • In this paper we present an algorithm about how to simulate two dimensional dam breaking with lattice Boltzmann method (LBM). LBM considers a typical volume element of fluid to be composed of a collection of particles that represented by a particle velocity distribution function for each fluid component at each grid point. We use the modified Lattice Boltzmann Method for incompressible fluid. This paper will represent detailed information on single phase flow which considers only the water instead of both air and water. Interface treatment and conservation of mass are the most important things in simulating free surface where the Interface is treated by mass exchange with the water region. We consider the surface tension on the interface and also bounce back boundary condition for the treatment of solid obstacles. We will compare the results of the simulation with some methods and experimental results.

  • PDF

Predicted Air Flow Around Objects Using the Discrete Vortex Method

  • Kim, Tae-Hyeung
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.9 no.E
    • /
    • pp.347-357
    • /
    • 1993
  • The Lagrangian grid-free numerical method, the discrete vortex method, was applied to solve the Navier-Stokes euqations. This method avoids the introduction of numerical viscosity swamping the real physical viscosity at high Reynolds number, unlike Eulerian method, e.g. finite difference and element methods. The boundary integral equation method for the potential flow solution was included to make the discrete vortex method more feasible for complex geometries. The fast adaptive multipole expansion method was incorporated to reduce the computational time from $O(N^2)$ to O(N) for the computations of vortex-vortex interactions. The test problems were air flow around one circular cylinder and two circular cylinders in tandem with various gaps. The numerical results were in excellent gareement with the experimental and other computational results. The applicabilty of the method was discussed with the indoor and the outdoor air pollution problems, especially the contaminant transport in the recirculation regions.

  • PDF

DETACHED EDDY SIMULATION OF AN INCOMPRESSIBLE FLOW PAST AN OPEN CAVITY (DES 방법을 이용한 비압축성 열린 공동 유동의 수치적 모사)

  • Chang K.S.;Park S.O.;Kwon O.J.;Constantinescu G.
    • Journal of computational fluids engineering
    • /
    • v.10 no.3 s.30
    • /
    • pp.48-54
    • /
    • 2005
  • Three-dimensional incompressible flow past an open cavity in a channel is investigated using Detached Eddy Simulation(DES). The length to depth ratio of the cavity is 2 and the Reynolds number defined with the cavity depth is 3,360. The DES methods are based on the Menter's SST model. In the present work, two types of inflow conditions are used: one is RANS profile, the other is LES inflow from another Large Eddy Simulation(LES) of fully developed channel flow. The results are compared with experimental data and LES results in terms of the mean statistics, temporal physics and scalar transport phenomenon of the flow.

Numerical Simulation of Three Dimensional Incompressible Flows Using the Navier-Stokes Equations with the Artificial Dissipation Terms and a Multigrid Method (다중격자와 인공점성항을 이용한 3차원 비압축성 흐름에 관한 수치모형 해석)

  • Park, Ki-Doo;Lee, Kil-Seong
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.1392-1396
    • /
    • 2007
  • The governing equations in generalized curvilinear coordinates for 3D laminar flow are the Incompressible Navier-Stokes (INS) equations with the artificial dissipative terms. and continuity equation discretized using a second-order accurate, finite volume method on the nonstaggered computational grid. This method adopts a dual or pseudo time-stepping Artificial Compressibility (AC) method integrated in pseudo-time. Multigrid methods are also applied because solving the equations on the coarse grids requires much less computational effort per iteration than on the fine grid. The algorithm yields practically identical velocity profiles and secondary flows that are in excellent overall agreement with an experimental measurement (Humphrey et al., 1977).

  • PDF

Improved Method for the Macroblock-Level Deblocking Scheme

  • Le, Thanh Ha;Jung, Seung-Won;Baek, Seung-Jin;Ko, Sung-Jea
    • ETRI Journal
    • /
    • v.33 no.2
    • /
    • pp.194-200
    • /
    • 2011
  • This paper presents a deblocking method for video compression in which the blocking artifacts are effectively extracted and eliminated based on both spatial and frequency domain operations. Firstly, we use a probabilistic approach to analyze the performance of the conventional macroblock-level deblocking scheme. Then, based on the results of the analysis, an algorithm to reduce the computational complexity is introduced. Experimental results show that the proposed algorithm outperforms the conventional video coding methods in terms of computation complexity while coding efficiency is maintained.

Investigation of Design Methodology for Impressed Current Cathodic Protection Optimum System

  • Yao, Ping;Wu, Jianhua
    • Corrosion Science and Technology
    • /
    • v.7 no.4
    • /
    • pp.197-200
    • /
    • 2008
  • In this paper, physical scale modeling was employed to identify the configurations of ICCP system and the electric field signatures. Computational boundary element modeling technique has been used to simulate the performance of the CP system and to predict the associated electric fields signatures. The optimization methods combined with the computer models and physical scale modeling will be presented here, which enable the optimum system design to be achieved both in terms of the location and current output of the anode but also in the location of reference electrodes for impressed current cathodic protection(ICCP) systems. The combined methodology was utilized to determine optimal placement of ICCP components (anodes and reference electrodes) and to evaluate performance of ICCP system for the 2%, 10% and 14% wetted hull coatings loss. The objective is to design the system to minimise the electric field while at the same time provide adequate protection for the ship. The results show that experimental scale modeling and computational modeling techniques can be used in concert to design an optimum ICCP system and to provide information for quickly analysis of the system and its surrounding environment.

Detection and Localization of Image Tampering using Deep Residual UNET with Stacked Dilated Convolution

  • Aminu, Ali Ahmad;Agwu, Nwojo Nnanna;Steve, Adeshina
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.203-211
    • /
    • 2021
  • Image tampering detection and localization have become an active area of research in the field of digital image forensics in recent times. This is due to the widespread of malicious image tampering. This study presents a new method for image tampering detection and localization that combines the advantages of dilated convolution, residual network, and UNET Architecture. Using the UNET architecture as a backbone, we built the proposed network from two kinds of residual units, one for the encoder path and the other for the decoder path. The residual units help to speed up the training process and facilitate information propagation between the lower layers and the higher layers which are often difficult to train. To capture global image tampering artifacts and reduce the computational burden of the proposed method, we enlarge the receptive field size of the convolutional kernels by adopting dilated convolutions in the residual units used in building the proposed network. In contrast to existing deep learning methods, having a large number of layers, many network parameters, and often difficult to train, the proposed method can achieve excellent performance with a fewer number of parameters and less computational cost. To test the performance of the proposed method, we evaluate its performance in the context of four benchmark image forensics datasets. Experimental results show that the proposed method outperforms existing methods and could be potentially used to enhance image tampering detection and localization.