Prandtl's Mixing Length Model - Revisited
نویسندگان
چکیده
منابع مشابه
The near wall mixing length formulation revisited
The calculation of transport phenomena in boundary layers, pipe or duct ̄ows can be easily accomplished by a simple, zero order, mixing length formulation. The application of this model in simple engineering ̄ows, i.e., ̄ows without recirculation or asymmetry, is still widely extended because of its simplicity and its ability to match experimental results at the same degree than more elaborated mo...
متن کاملShear bands in granular flow through a mixing length model
Abstract. We discuss the advantages and results of using a mixing-length, compressible model to account for shear banding behaviour in granular flow. We formulate a general approach based on two function of the solid fraction to be determined. Studying the vertical chute flow, we show that shear band thickness is always independent from flowrate in the quasistatic limit, for Coulomb wall bounda...
متن کاملThe Bi-maximal Neutrino Mixing Pattern Revisited
I propose a simple extension of the bi-maximal neutrino mixing pattern, allowing slight coupling between solar and atmospheric neutrino oscillations as well as large CP violation. The new scenario is compatible with either the vacuum oscillation solution or the large-angle MSW solution to the solar neutrino problem. Electronic address: [email protected] 1 To interpret current expe...
متن کاملThe η-η′ mixing angle revisited
The value of the η-η′ mixing angle θP is phenomenologically deduced from a rather exhaustive and up-to-date analysis of data including strong decays of tensor and higher-spin mesons, electromagnetic decays of vector and pseudoscalar mesons, J/ψ decays into a vector and a pseudoscalar meson, and other transitions. A value of θP between −17◦ and −13◦ is consistent with the present experimental ev...
متن کاملFrom Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited
To sign with RSA, one usually encodes the message m as μ(m) and then raises the result to the private exponent modulo N . In Asiacrypt 2000, Coron et al. showed how to build a secure RSA encoding scheme μ′(m) for signing arbitrarily long messages from a secure encoding scheme μ(m) capable of handling only fixed-size messages, without making any additional assumptions. However, their constructio...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: PAMM
سال: 2006
ISSN: 1617-7061,1617-7061
DOI: 10.1002/pamm.200610269