A new methodology for turbulencemodelers using DNS database analysisBy

نویسندگان

  • S. Parneix
  • P. Durbin
چکیده

1. Motivation and objectives Many industrial applications in such elds as aeronautical, mechanical, thermal, and environmental engineering involve complex turbulent ows containing global separations and subsequent reattachment zones. Accurate prediction of this phenomena is very important because separations innuence the whole uid ow and may have an even bigger impact on surface heat transfer. In particular, reattaching ows are known to be responsible for large local variations of the local wall heat transfer coeecient as well as modifying the overall heat transfer. For incompress-ible, non-buoyant situations, the uid mechanics have to be accurately predicted in order to have a good resolution of the temperature eld. Much previous work on such phenomena has used the case of the backward facing step. The sudden expansion of a channel ow indeed gives rise to a simple geometry, but one that contains complex aerodynamic features such as separation, a spreading shear layer, interaction of this shear layer with a wall, recirculation, and recovery of the reattached boundary layer. Moreover, a lot of databases are available from physical experiments to numerical simulations (DNS and LES): this makes for a good test case on which to validate turbulence models. In past years, various two-equation turbulence models have been tested and compared with the available experiments. The principal feature of models using wall functions is an underprediction of the recirculation length by about 15%. In fact, recent simulations or experiments show an important departure of the velocity pro-les from the law of the wall, not only in the recirculation, but also in the recovery region. A bad prediction of aerodynamics near the wall would have dramatic effects on predictions of heat transfer. The low-Reynolds number cases show strong anisotropies, not only in the boundary layer, but also in the spreading shear layer and in the recirculation; any linear two-equation model would fail to reproduce this important feature of the ow. For this reason, and with the aim of future studies of ows involving buoyancy, curvature, or rotation, we decided to use a Second Moment Closure (SMC) approach, which intrinsically can take into account these phenomena. The closure of the Reynolds-stress equations consists partially in nding a model for the pressure-strain correlation which acts as a redistribution term between the Reynolds-stress components. Since the Launder, Reece and Rodi, 1975 (LRR) paper , a number of models have been proposed especially to take into account speciic wall-behavior. However, all …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Active Bot Networks Based on DNS Traffic Analysis

Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and redu...

متن کامل

Consolidated Review of On Measuring the Client-Side DNS Infrastructure

1. Strengths: The paper sketches the complexity of today's DNS infrastructure and shows a number of clever specific techniques to understand some aspects of DNS resolvers. The paper is written and presented well. It describes the complex infrastructure of DNS very well so that someone who is not keen on the system can also appreciate the paper. The reviewers also like the methodology to discove...

متن کامل

On LEM/LES Methodology for Two-Phase Flows

A two-phase subgrid combustion model developed earlier has been evaluated for applicability in largeeddy simulations (LES). Direct Numerical Simulations (DNS) of two-phase isotropic turbulence in the presence of passive, momentum-coupled and vaporizing droplets has been extensively studied to form a base-line database. Current DNS results agree with earlier studies and show that the presence of...

متن کامل

Studying Global DNS Performance for ENUM Protocol

ENUM (Electronic NUMbering) is a new protocol designed to translate numbers into information by using the DNS (Domain Name System) architecture. Its success will depend on whether the DNS can achieve a performance similar to the database used in the current classical voice services. The paper[1] shows different causes influencing the retrieval time of a World Wide Object. Of all the different f...

متن کامل

Key Revocation System for DNSSEC

The Domain Name System (DNS) is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions (DNSSEC) has been designed to protect the DNS protocol using public key cryptography and digital signatures. In this paper, we show how DNSSEC can be attacked using compromised keys and the consequences of such attacks. Then, w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996