• Title/Summary/Keyword: DNS

Search Result 470, Processing Time 0.025 seconds

THE EFFECTS OF WALL BOUNDARY CONDITIONS ON MASS TRANSFER IN TURBULENT PIPE FLOW (난류 파이프 유동 내 물질전달에서의 경계조건 영향)

  • Kang, Chang-Woo;Yang, Kyung-Soo
    • Journal of computational fluids engineering
    • /
    • v.17 no.2
    • /
    • pp.42-52
    • /
    • 2012
  • Direct Numerical Simulation(DNS) of turbulent mass transfer in fully developed turbulent pipe flow has been performed to study the effect of wall boundary conditions on the concentration fields at $Re_{\tau}$=180 based on friction velocity and pipe radius. Fully developed turbulent pipe flows for Sc=0.71 are studied with two different wall boundary conditions, namely, constant mass flux and constant wall concentration. The mean concentration profiles and turbulent mass fluxes obtained from the present DNS are in good agreement with the previous numerical results currently available. To investigate the effects of wall boundary condition on the turbulent mass transfer, the mean concentration profile, root-mean-square of concentration fluctuation, turbulent mass fluxes and higher-order statistics(Skewness and Flatness factor) are compared for the two cases. Furthermore, the budgets of turbulent mass fluxes and concentration variance were computed and analyzed to elucidate the effects of wall boundary conditions on the turbulent mass transfer.

Transition of Turbulent Boundary Layer with a Step Change from Smooth to Rough Surface (표면 형상 변화에 따른 난류경계층 유동장 분석)

  • Lee, Jae Hwa
    • Journal of the Korean Society of Visualization
    • /
    • v.12 no.3
    • /
    • pp.15-20
    • /
    • 2014
  • Direct numerical simulation (DNS) dataset of a turbulent boundary layer (TBL) with a step change from smooth to rough surface is analyzed to examine spatially developing flow characteristics. The roughness elements are periodically arranged two-dimensional (2-D) spanwise rods with a streamwise pitch of ${\lambda}=8k$ ($=12{\theta}_{in}$), and the roughness height is $k=15{\theta}_{in}$, where ${\theta}_{in}$ is the inlet momentum thickness. The step change is introduced $80{\theta}_{in}$ downstream from the inlet. For the first time, full images from the DNS data with the step change from the smooth to rough walls is present to get some idea of the geometry of turbulent coherent structures over rough wall, especially focusing on their existence and partial dynamics over the rough wall. The results show predominance of hairpin vortices over the rough wall and their spanwise scale growth mechanism by merging.

Validation of the Turbulent Burning Velocity Based on Asymptotic Zone Conditional Transport in Turbulent Premixed Combustion (영역조건평균에 기초한 난류예혼합 화염 전파 속도식 유도 및 검증)

  • Lee, Dong-Kyu;Huh, Kang-Y.
    • Journal of the Korean Society of Combustion
    • /
    • v.13 no.1
    • /
    • pp.23-30
    • /
    • 2008
  • An analytical expression for the turbulent burning velocity is derived from the asymptotic zone conditional transport equation at the leading edge. It is given as a sum of laminar and turbulent contributions, the latter of which is given as a product of turbulent diffusivity in unburned gas and inverse scale of wrinkling at the leading edge. It was previously shown that the inverse scale is equal to four times the maximum flame surface density in the wrinkled flamelet regime [1]. The linear behavior between $U_T$ and u' shows deviation with the inverse scale decreasing due to the effect of a finite flamelet thickness at higher turbulent intensities. DNS results show that $U_T/S^0_{Lu}$ may be given as a function of two dimensionless parameters, $u'/S^0_{Lu}$ and $l_t/\delta_F$, which may be transformed into another relationship in terms of $u'/S^0_{Lu}$, and Ka. A larger $l_t/{\delta}_F$ or a smaller Ka leads to a smaller scale of wrinkling, hence a larger turbulent burning velocity in the limited range of $u'/S^0_{Lu}$. Good agreement is achieved between the analytical expression and the turbulent burning velocities from DNS in both wrinkled and thickened-wrinkled flame regimes.

  • PDF

Management Plan for Mobile Contents Bypassing In App Billing Application (모바일 컨텐츠 인앱 결제 우회 애플리케이션에 대한 대처 방안)

  • Lee, Sang-Ho;Shin, Miyea
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.21-26
    • /
    • 2015
  • As mobile contents grow up, In App Billing is brisk at applications including mobile contents. But some of users don't pay and use charged content for free to use cheating payment module or hacking through applications. Call this bypass payment. Applications, helping bypass, are Freedom, IAP Cracker, and DNS server suggested by the hacker named Borodin. In case of mobile game, Despite sell a lot of charged content but income is different revenue in sales log with real profits. Because of users using bypass payment application. Management plan to bypass payment are checking OrderID, encrypting public key and verifying receipt.

  • PDF

Analysis of Standard Security Technology for Security of the Network (네트워크의 보안성 강화를 위한 표준 정보보호 기술 분석)

  • Kim, Bong-Han
    • Journal of Digital Convergence
    • /
    • v.13 no.12
    • /
    • pp.193-202
    • /
    • 2015
  • The development of the security solutions that can provide a variety of security services is needed urgently. For development of the security solutions, analysis of international standard security technology is the key. In this paper, international organizations' standardization(ISO/IEC JTC1 SC27, ITU-T SG-17, IETF Security Area, etc.) and the current trend of the standard security technology are mainly analyzed. The core of the latest security technology(Application Bridging, DNS-based Authentication, HTTP Authentication, IP Security, Javascript Security, Authentication Technology Next Generation, Managed Incident, Web Authorization Protocol, Security Automation, Transport Layer Security, etc.) is analyzed focusing on 18 working groups of the IETF.

Near-Wall Modelling of Turbulent Heat Fluxes by Elliptic Equation (타원방정식에 의한 벽면 부근의 난류열유속 모형화)

  • Shin, Jong-Keun;An, Jeong-Soo;Choi, Young-Don
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.28 no.5
    • /
    • pp.526-534
    • /
    • 2004
  • A new second-moment closure model for turbulent heat fluxes is proposed on the basis of the elliptic equation. The new model satisfies the near-wall balance between viscous diffusion, viscous dissipation and temperature-pressure gradient correlation, and also has the characteristics of approaching its respective conventional high Reynolds number model far away from the wall. The predictions of turbulent heat transfer in a channel flow have been carried out with constant wall heat flux and constant wall temperature difference boundary conditions respectively. The velocity field variables are supplied from the DNS data and the differential equations only fur the mean temperature and the scalar flux are solved by the present calculations. The present model is tested by direct comparisons with the DNS to validate the performance of the model predictions. The prediction results show that the behavior of the turbulent heat fluxes in the whole region is well captured by the present model.

An Implementation of Security Key Management System by LDAP (LDAP을 이용한 보안 키 관리 시스템 구현)

  • Yoon, Sung-Jung;Kim, Geon-Ung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.3
    • /
    • pp.437-445
    • /
    • 2006
  • The security key management function is a key element to secure network environment, and many protocols include IPSec, HIP, etc. demand this function. There are two solutions to provide the key management function in the network layer, one is a method for storing security key material in the directory, and the other is a method for storing security key material in DNS. In this paper we present an implementation of key management system by LDAP. We deployed the open source solutions for directory service(OpenLDAP), cryptographic algorithm (FLINT/C), IPSec(FreeS/WAN), and verified the key management system by the encrypted message exchange and the interoperability test by un daemon.

Development of Low Reynolds Number k-ε Model for Prediction of a Turbulent Flow with a Weak Adverse Pressure Gradient (약한 역압력구배의 난류유동장 해석을 위한 저레이놀즈수 k-ε 모형 개발)

  • Song, Kyoung;Cho, Kang Rae
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.23 no.5
    • /
    • pp.610-620
    • /
    • 1999
  • Recently, numerous modifications of low Reynolds number $k-{\epsilon}$ model have boon carried out with the aid of DNS data. However, the previous models made in this way are too intricate to be used practically. To overcome this shortcoming, a new low Reynolds number $k-{\epsilon}$ model has boon developed by considering the distribution of turbulent properties near the wall. This study proposes the revised a turbulence model for prediction of turbulent flow with adverse pressure gradient and separation. Nondimensional distance $y^+$ in damping functions is changed to $y^*$ and some terms modeled for one dimensional flow in $\epsilon$ equations are expanded into two or three dimensional form. Predicted results by the revised model show an acceptable agreement with DNS data and experimental results. However, for a turbulent flow with severe adverse pressure gradient, an additive term reflecting an adverse pressure gradient effect will have to be considered.

Internet Governance & Politics of Expertise (인터넷 거버넌스와 전문성의 정치)

  • Kim, Ji-Yeon
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.5-20
    • /
    • 2013
  • ICANN has been governing the Domain Name System(DNS) "technically" since 1998. The architecture is called Internet Governance, and it brings about many different discourses; "What does that govern?", "Who delegate its role to ICANN?"," How could the regime ensure fairness?" etc. This article will analyze on Internet Governance by applying the government approach of Foucault, and try to compare two parts, the 'core' and the 'edge' of Internet Governance for method. Whereas the 'core' of it refers the site that be governed by the formal contract directly, the 'edge' as the rest of it means informal friendly relations with ICANN. The 'core' rule was stemmed from technological community such as IAB or IETF historically. They had invented new world and its population to integrate the technical order as protocol and the semiotic order as language, that be based on new government mode. On the other hand, ".KR" domain, one of the 'edges', has been evolved into more heterogeneous system, through contest and conflict between traditional state and Internet Governance. The governed object of ".KR" domain is situated in the crossing of each other the 'protocol user', the 'language-semiotic user' and the' geographical resident'. Here the 'geographical resident' rule was weird for DNS, so that shows the internal lack of Internet Governance. It needs to move to the concept of 'Hangeul(Korean-language) user' rather than the 'geographical resident'.

  • PDF

Nonlinear Stability Analysis of Boundary Layers by using Nonlinear Parabolized Stabiltiy Equations (Nonlinear PSE를 이용한 경계층의 비선형 안정성 해석)

  • Park, Dong-Hun;Park, Seung-O
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.9
    • /
    • pp.805-815
    • /
    • 2011
  • Nonlinear Parabolized Stability Equations(NSPE) can be effectively used to study more throughly the transition process. NPSE can efficiently analyze the stability of a nonlinear region in transition process with low computational cost compared to Direct Numerical Simulation(DNS). In this study, NPSE in general coordinate system is formulated and a computer code to solve numerically the equations is developed. Benchmark problems for incompressible and compressible boundary layers over a flat plate are analyzed to validate the present code. It is confirmed that the NPSE methodology constructed in this study is an efficient and effective tool for nonlinear stability analysis.