Results 11 to 20 of about 6,040,269 (294)

Application of a Gas-Kinetic BGK Scheme in Thermal Protection System Analysis for Hypersonic Vehicles

open access: yesEntropy, 2022
One major problem in the development of hypersonic vehicles is severe aerodynamic heating; thus, the implementation of a thermal protection system is required.
Di Zhou   +4 more
doaj   +1 more source

Numerical Simulation of Heat Reduction With Use of Spike in Hypersonic Flow Based on Gas Kinetic Scheme

open access: yes气体物理, 2023
Based on the gas kinetic scheme (GKS), numerical simulation research on the thermal protection system with the spike was carried out from the independent flow field and the fluid-structure interaction. The reliability of the algorithm in independent flow
Chang-ya LIU   +3 more
doaj   +1 more source

A High-Order Discontinuous Galerkin Method for Solving Preconditioned Euler Equations

open access: yesApplied Sciences, 2022
A high-order discontinuous Galerkin (DG) method is presented for solving the preconditioned Euler equations with an explicit or implicit time marching scheme.
Huanqin Gao   +4 more
doaj   +1 more source

GPU-Accelerated Infill Criterion for Multi-Objective Efficient Global Optimization Algorithm and Its Applications

open access: yesApplied Sciences, 2022
In this work, a novel multi-objective efficient global optimization (EGO) algorithm, namely GMOEGO, is presented by proposing an approach of available threads’ multi-objective infill criterion.
Shengguan Xu   +6 more
doaj   +1 more source

An Optimized Pressure-Based Method for Thrust Vectoring Angle Estimation

open access: yesAerospace, 2023
This research developed a pressure-based thrust vectoring angle estimation method for fluidic thrust vectoring nozzles. This method can accurately estimate the real-time in-flight thrust vectoring angle using only wall pressure information on the inner ...
Nanxing Shi   +5 more
doaj   +1 more source

CFI: Control Flow Integrity or Control Flow Interruption?

open access: yes2019 IEEE East-West Design & Test Symposium (EWDTS), 2019
Runtime memory vulnerabilities, especially present in widely used languages as C and C++, are exploited by attackers to corrupt code pointers and hijack the execution flow of a program running on a target system to force it to behave abnormally. This is the principle of modern Code Reuse Attacks (CRAs) and of famous attack paradigms as Return-Oriented ...
Maunero N., Prinetto P., Roascio G.
openaire   +2 more sources

Control versus Data Flow in Parallel Database Machines [PDF]

open access: yes, 1993
The execution of a query in a parallel database machine can be controlled in either a control flow way, or in a data flow way. In the former case a single system node controls the entire query execution.
Blanken, Henk M., Teeuw, Wouter B.
core   +2 more sources

Ultrasound Flow-Monitoring and Flow-Metering of Air–Oil–Water Three-Layer Pipe Flows

open access: yesIEEE Access, 2017
The combined use of ultrasound pulse-echo intensity and Doppler shift frequency is examined as a means to measure strong unsteady three-phase pipe flows of a gas and two liquids.
Junpei Hitomi   +3 more
doaj   +1 more source

Queue Dynamics With Window Flow Control [PDF]

open access: yes, 2010
This paper develops a new model that describes the queueing process of a communication network when data sources use window flow control. The model takes into account the burstiness in sub-round-trip time (RTT) timescales and the instantaneous rate ...
Andrew, Lachlan L. H.   +5 more
core   +3 more sources

Comparative Study of Dynamic Stall between an Aircraft Airfoil and a Wind Turbine Airfoil in an Air–Particle Flow

open access: yesApplied Sciences, 2021
Dynamic stall in clean air flow has been well studied, but its exploration in air–particle (air–raindrop or air–sand) flow is still lacking. The aerodynamic performance loss of aircraft (NACA0012) and wind turbine (S809) airfoils and their differences ...
Junjun Jin   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy