Search results

1 – 10 of over 73000
Article
Publication date: 7 January 2021

Saba Gharehdash, Bre-Anne Louise Sainsbury, Milad Barzegar, Igor B. Palymskiy and Pavel A. Fomin

This research study aims to develop regular cylindrical pore network models (RCPNMs) to calculate topology and geometry properties of explosively created fractures along with…

253

Abstract

Purpose

This research study aims to develop regular cylindrical pore network models (RCPNMs) to calculate topology and geometry properties of explosively created fractures along with their resulting hydraulic permeability. The focus of the investigation is to define a method that generates a valid geometric and topologic representation from a computational modelling point of view for explosion-generated fractures in rocks. In particular, extraction of geometries from experimentally validated Eulerian smoothed particle hydrodynamics (ESPH) approach, to avoid restrictions for image-based computational methods.

Design/methodology/approach

Three-dimensional stabilized ESPH solution is required to model explosively created fracture networks, and the accuracy of developed ESPH is qualitatively and quantitatively examined against experimental observations for both peak detonation pressures and crack density estimations. SPH simulation domain is segmented to void and solid spaces using a graphical user interface, and the void space of blasted rocks is represented by a regular lattice of spherical pores connected by cylindrical throats. Results produced by the RCPNMs are compared to three pore network extraction algorithms. Thereby, once the accuracy of RCPNMs is confirmed, the absolute permeability of fracture networks is calculated.

Findings

The results obtained with RCPNMs method were compared with three pore network extraction algorithms and computational fluid dynamics method, achieving a more computational efficiency regarding to CPU cost and a better geometry and topology relationship identification, in all the cases studied. Furthermore, a reliable topology data that does not have image-based pore network limitations, and the effect of topological disorder on the computed absolute permeability is minor. However, further research is necessary to improve the interpretation of real pore systems for explosively created fracture networks.

Practical implications

Although only laboratory cylindrical rock specimens were tested in the computational examples, the developed approaches are applicable for field scale and complex pore network grids with arbitrary shapes.

Originality/value

It is often desirable to develop an integrated computational method for hydraulic conductivity of explosively created fracture networks which segmentation of fracture networks is not restricted to X-ray images, particularly when topologic and geometric modellings are the crucial parts. This research study provides insight to the reliable computational methods and pore network extraction algorithm selection processes, as well as defining a practical framework for generating reliable topological and geometrical data in a Eulerian SPH setting.

Details

Engineering Computations, vol. 38 no. 5
Type: Research Article
ISSN: 0264-4401

Keywords

Open Access
Article
Publication date: 28 October 2021

Ben M. Roberts, David Allinson and Kevin J. Lomas

Accurate values for infiltration rate are important to reliably estimate heat losses from buildings. Infiltration rate is rarely measured directly, and instead is usually…

2086

Abstract

Purpose

Accurate values for infiltration rate are important to reliably estimate heat losses from buildings. Infiltration rate is rarely measured directly, and instead is usually estimated using algorithms or data from fan pressurisation tests. However, there is growing evidence that the commonly used methods for estimating infiltration rate are inaccurate in UK dwellings. Furthermore, most prior research was conducted during the winter season or relies on single measurements in each dwelling. Infiltration rates also affect the likelihood and severity of summertime overheating. The purpose of this work is to measure infiltration rates in summer, to compare this to different infiltration estimation methods, and to quantify the differences.

Design/methodology/approach

Fifteen whole house tracer gas tests were undertaken in the same test house during spring and summer to measure the whole building infiltration rate. Eleven infiltration estimation methods were used to predict infiltration rate, and these were compared to the measured values. Most, but not all, infiltration estimation methods relied on data from fan pressurisation (blower door) tests. A further four tracer gas tests were also done with trickle vents open to allow for comment on indoor air quality, but not compared to infiltration estimation methods.

Findings

The eleven estimation methods predicted infiltration rates between 64 and 208% higher than measured. The ASHRAE Enhanced derived infiltration rate (0.41 ach) was closest to the measured value of 0.25 ach, but still significantly different. The infiltration rate predicted by the “divide-by-20” rule of thumb, which is commonly used in the UK, was second furthest from the measured value at 0.73 ach. Indoor air quality is likely to be unsatisfactory in summer when windows are closed, even if trickle vents are open.

Practical implications

The findings have implications for those using dynamic thermal modelling to predict summertime overheating who, in the absence of a directly measured value for infiltration rate (i.e. by tracer gas), currently commonly use infiltration estimation methods such as the “divide-by-20” rule. Therefore, infiltration may be overestimated resulting in overheating risk and indoor air quality being incorrectly predicted.

Originality/value

Direct measurement of air infiltration rate is rare, especially multiple tests in a single home. Past measurements have invariably focused on the winter heating season. This work is original in that the tracer gas technique used to measure infiltration rate many times in a single dwelling during the summer. This work is also original in that it quantifies both the infiltration rate and its variability, and compares these to values produced by eleven infiltration estimation methods.

Details

International Journal of Building Pathology and Adaptation, vol. 41 no. 1
Type: Research Article
ISSN: 2398-4708

Keywords

Content available

Abstract

Details

Kybernetes, vol. 41 no. 7/8
Type: Research Article
ISSN: 0368-492X

Article
Publication date: 1 February 2002

Bart Merci, Erik Dick, Jan Vierendeels and Chris De Langhe

Different methods for the determination of accurate values for the dissipation rate ϵ at the inlet boundary of a computational domain, are studied. With DNS data for a fully…

Abstract

Different methods for the determination of accurate values for the dissipation rate ϵ at the inlet boundary of a computational domain, are studied. With DNS data for a fully developed channel flow and pipe flow, it is shown that the method suggested by Rhee and Sung (2000), in which the kϵ turbulence model is used to compute both k and ϵ from a given velocity profile, is not reliable and can result in very poor results. The method is found to be extremely sensitive to the details of the imposed velocity profile. An alternative procedure is proposed, in which only the ϵ transport equation is employed, with given profiles for the mean velocity and the turbulence kinetic energy. This way, accurate and reliable profiles are obtained for ϵ. Another procedure, based on the turbulent mixing length, was suggested by Jones (1994). The problem. The problem is then shifted towards the determination of the mixing length at the inlet boundary of the computational domain. An expression for this mixing length is proposed in this paper, based on the mentioned DNS data. Finally, the method proposed by Rodi and Scheuerer (1985) is included for comparison reasons. The different procedures are first validated on the fully developed channel and pipe flow. Next, the turbulent flow over a backward‐facing step is considered. Finally, the influence of the inlet boundary condition for ϵ is illustrated in the application of a turbulent piloted jet diffusion flame.

Details

International Journal of Numerical Methods for Heat & Fluid Flow, vol. 12 no. 1
Type: Research Article
ISSN: 0961-5539

Keywords

Article
Publication date: 4 September 2017

Ewa Cichocka

The paper focuses on the evaluation of a light aircraft spin. The main purpose of this paper is to achieve reliable mathematical models of aircraft motion beyond stall conditions…

Abstract

Purpose

The paper focuses on the evaluation of a light aircraft spin. The main purpose of this paper is to achieve reliable mathematical models of aircraft motion beyond stall conditions to subsequently predict spin properties based on calculation only. Another vitally significant objective is to verify whether the aerodynamic characteristics determined numerically are coherent with the wind tunnel measurements performed on the dynamically scaled aircraft models.

Design/methodology/approach

The analysis was carried out for two certified conventional light aircraft. The first part of the investigation is devoted to the verification of the simplified methods used to identify the aircraft recoverability from spinning steady-state turns and estimate the primary post-stall flight parameters. Then, the spin simulations were executed. The computational results were thereafter compared with the in-flight data recordings.

Findings

The study confirms the coincidence between the calculated spinning behaviour and the observed aircraft response during the flight tests. The mathematical models of aircraft spatial motion have been found to be credible for predicting spin properties. The simplified methods are reliable to determine the basic spin performance of light aircraft at the preliminary design stage, whereas the spin simulations enable recognition and comprehensive examination of all spin modes.

Practical implications

The outcomes of conducted calculation and comparisons of computational spin properties with flight test recordings have indicated that the qualitative assessment of spinning motion is enabled at each stage of the designing process.

Originality/value

The paper involves the comparison of the computational results with the recordings of spin in-flight tests and the correlation between calculated and experimentally obtained aerodynamics of light aircraft.

Details

Aircraft Engineering and Aerospace Technology, vol. 89 no. 5
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 12 April 2013

M. Matinfar and M. Ghasemi

The purpose of this paper is to solve an unsteady nonlinear convective‐radiative equation and a nonlinear convective‐radiative‐conduction equation containing two small parameters…

Abstract

Purpose

The purpose of this paper is to solve an unsteady nonlinear convective‐radiative equation and a nonlinear convective‐radiative‐conduction equation containing two small parameters of ε1 and ε2 by variational homotopy perturbation method.

Design/methodology/approach

The heat transfer equations are described. The variational homotopy perturbation method as a powerful method for solving linear and nonlinear equations is applied to find the solutions of our model equations.

Findings

The solutions of heat transfer equations are calculated in the form of convergent series with easily computable components. Two examples are solved as illustrations, using symbolic computation.

Originality/value

The results show that the suggested method is easy to implement and has high level of accuracy. The method introduces a reliable tool for solving many linear and nonlinear differential equations.

Details

International Journal of Numerical Methods for Heat & Fluid Flow, vol. 23 no. 3
Type: Research Article
ISSN: 0961-5539

Keywords

Abstract

Details

Contingent Valuation: A Critical Assessment
Type: Book
ISBN: 978-1-84950-860-5

Article
Publication date: 1 June 2021

Hossein Bakhshi, Hiwa Weisi and Nouroddin Yousofi

This paper explores the challenges of conducting qualitative research from ELT (English Language Teaching) Ph.D. candidates' perspectives.

Abstract

Purpose

This paper explores the challenges of conducting qualitative research from ELT (English Language Teaching) Ph.D. candidates' perspectives.

Design/methodology/approach

The participants of the study consisted of 30 Iranian Ph.D. students majoring in ELT. The semi-structured interview was employed to investigate the heart of experiences, issues and concerns of participants with regard to conducting qualitative research (QLR) challenges. To analyze the collected data, the recorded interviews were transcribed, and then the grounded theory approach was employed (Charmaz, 2006).

Findings

The results revealed that the major challenges of the participants consist of the credibility of QLR in ELT contexts, hermeneutic and fuzzy nature of QLR, qualitative data analysis and interpretation, publishing qualitative findings and the system of measuring professors' productivity.

Originality/value

The findings may help professors, mainly EFL ones, in research mentoring and developing research syllabi for graduate students. In addition, it may motivate Ph.D. candidates to employ QLR methods in their research studies. The pedagogical and theoretical implications of the study are discussed at the end of the paper.

Details

Journal of Applied Research in Higher Education, vol. 14 no. 3
Type: Research Article
ISSN: 2050-7003

Keywords

Article
Publication date: 7 June 2013

Ang Cui, Jatin Kataria and Salvatore J. Stolfo

IOS firmware diversity, the unintended consequence of a complex firmware compilation process, has historically made reliable exploitation of Cisco routers difficult. With…

Abstract

Purpose

IOS firmware diversity, the unintended consequence of a complex firmware compilation process, has historically made reliable exploitation of Cisco routers difficult. With approximately 300,000 unique IOS images in existence, a new class of version‐agnostic shellcode is needed in order to make the large‐scale exploitation of Cisco IOS possible. The purpose of this paper is to show that such attacks are now feasible by demonstrating two different reliable shellcodes that will operate correctly over many Cisco hardware platforms and all known IOS versions.

Design/methodology/approach

The paper examines prior work in the area of Cisco IOS rootkits and constructs a novel IOS version‐agnostic rootkit called the interrupt‐hijack rootkit.

Findings

As the experimental results show, the techniques proposed in this paper can reliably inject command and control capabilities into arbitrary IOS images in a version‐agnostic manner.

Originality/value

The authors believe that the technique presented in this paper overcomes an important hurdle in the large‐scale, reliable rootkit execution within Cisco IOS. Thus, effective host‐based defence for such routers is imperative for maintaining the integrity of our global communication infrastructures.

Details

Information Management & Computer Security, vol. 21 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 21 May 2009

Sutapa Das, Kim Leng Poh and Michael Yit Lin Chew

Besides designing a comprehensive building maintainability scoring system, this paper aims to develop a standard and reliable method for acquisition of tacit knowledge in facility…

1092

Abstract

Purpose

Besides designing a comprehensive building maintainability scoring system, this paper aims to develop a standard and reliable method for acquisition of tacit knowledge in facility management (FM) and convert the same into organizational records so that the current dearth of information and poor feedback leading to recurrent defects and arbitrary FM strategies can be eliminated.

Design/methodology/approach

Nine major building elements in terms of maintainability were compared by analytic hierarchy process (AHP). Various aspects of consistency checking and group decision making were reviewed to find the best suitable method. During data collection via an AHP questionnaire in face‐to‐face interviews, logical reasoning employed by experts was noted and later matched with the subjective data.

Findings

It was observed that technical viability of services and business profile given by building height and location, respectively, set different priorities for major building elements. HVAC system is the prime element followed by elevator and façade. Such priorities can be derived from consistent judgment which improves steadily with a decision‐maker's work experience. A threshold of 10 per cent consistency and aggregating individual priorities (AIP) using geometric mean method of AHP were found most appropriate.

Practical implications

Adaptation of this framework will help industry experts to document their tacit knowledge in a structured manner without facing present constraints. By tracking the recorded facts and logical reasoning, neophytes can learn the multi‐faceted aspects of FM without trial and error.

Originality/value

This research establishes AHP as a standard and reliable method for knowledge acquisition and thus elevates its status from a multi‐criteria decision analysis tool to decision enhancement tool.

Details

Facilities, vol. 27 no. 7/8
Type: Research Article
ISSN: 0263-2772

Keywords

1 – 10 of over 73000