This paper studies the attached sheet cavitation in centrifugal pumps. A pump casted from Perspex is used as the test subject. The cavitation bubbles were observed in the entrance of the impeller and the drops of the ...This paper studies the attached sheet cavitation in centrifugal pumps. A pump casted from Perspex is used as the test subject. The cavitation bubbles were observed in the entrance of the impeller and the drops of the head coefficients were measured under different operating conditions. A Filter-Based Model (FBM), derived from the RNG k-e model, and a modified Zwart model are adopted in the numerical predictions of the unsteady cavitating flows in the pump. The simulations are carded out and the results are compared with experimental results for 3 different flow coefficients, from 0.077 to 0.114. Under four operating conditions, qualitative comparisons are made between experimental and numerical cavitation patterns, as visualized by a high-speed camera and described as isosurfaces of the vapour volume fraction ctv = 0.1. It is shown that the simulation can truly represent the development of the attached sheet cavitation in the impeller. At the same time, the curves for the drops of the head coefficients obtained from experiments and calculations are also quantitatively compared, which shows that the decline of the head coefficients at every flow coefficient is correctly captured, and the prediction accuracy is high. In addition, the detailed analysis is made on the vapour volume fraction contours on the plane of span is 0.5 and the loading distributions around the blade section at the midspan. It is shown that the FBM model and the modified Zwart model are effective for the numerical simulation of the cavitating flow in centrifugal pumps. The analysis results can also be used as the basis for the further research of the attached sheet cavitation and the improvement of centrifugal pumps.展开更多
This paper proposes an automatic attack construction algorithm in order to find potential attacks on ecurity protocols.It is based on a dynamic strand space model,which enhances the original strand space model by intr...This paper proposes an automatic attack construction algorithm in order to find potential attacks on ecurity protocols.It is based on a dynamic strand space model,which enhances the original strand space model by introducing active nodes on strands so as to characterize the dynamic procedure of protocol execution.With exact causal dependency relations between messages considered in the model,this algorithm can avoid state space explo-sion caused by asynchronous composition.In order to get a finite state space,a new method called strand-added on demand is exploited,which extends a bundle in an incremental manner without requiring explicit configuration of protocol execution parameters.A finer granularity model of term structure is also introduced, in which subterms are divided into check subterms and data subterms .Moreover,data subterms can be further classified based on the compatible data subterm relation to obtain automatically the finite set of valid acceptable terms for an honest principal.In this algorithm,terms core is designed to represent the intruder's knowledge compactly,and forward search technology is used to simulate attack patterns easily.Using this algorithm,a new attack on the Dolve-Yao protocol can be found,which is even more harmful beeause the secret is revealed before the session terminates.展开更多
基金supported by the National Natural Science Funds for Distinguished Young Scholar (Grant No. 50825902)the Natural Science Foundation of Jiangsu Province (Grant Nos.51239005, 51179075)
文摘This paper studies the attached sheet cavitation in centrifugal pumps. A pump casted from Perspex is used as the test subject. The cavitation bubbles were observed in the entrance of the impeller and the drops of the head coefficients were measured under different operating conditions. A Filter-Based Model (FBM), derived from the RNG k-e model, and a modified Zwart model are adopted in the numerical predictions of the unsteady cavitating flows in the pump. The simulations are carded out and the results are compared with experimental results for 3 different flow coefficients, from 0.077 to 0.114. Under four operating conditions, qualitative comparisons are made between experimental and numerical cavitation patterns, as visualized by a high-speed camera and described as isosurfaces of the vapour volume fraction ctv = 0.1. It is shown that the simulation can truly represent the development of the attached sheet cavitation in the impeller. At the same time, the curves for the drops of the head coefficients obtained from experiments and calculations are also quantitatively compared, which shows that the decline of the head coefficients at every flow coefficient is correctly captured, and the prediction accuracy is high. In addition, the detailed analysis is made on the vapour volume fraction contours on the plane of span is 0.5 and the loading distributions around the blade section at the midspan. It is shown that the FBM model and the modified Zwart model are effective for the numerical simulation of the cavitating flow in centrifugal pumps. The analysis results can also be used as the basis for the further research of the attached sheet cavitation and the improvement of centrifugal pumps.
文摘This paper proposes an automatic attack construction algorithm in order to find potential attacks on ecurity protocols.It is based on a dynamic strand space model,which enhances the original strand space model by introducing active nodes on strands so as to characterize the dynamic procedure of protocol execution.With exact causal dependency relations between messages considered in the model,this algorithm can avoid state space explo-sion caused by asynchronous composition.In order to get a finite state space,a new method called strand-added on demand is exploited,which extends a bundle in an incremental manner without requiring explicit configuration of protocol execution parameters.A finer granularity model of term structure is also introduced, in which subterms are divided into check subterms and data subterms .Moreover,data subterms can be further classified based on the compatible data subterm relation to obtain automatically the finite set of valid acceptable terms for an honest principal.In this algorithm,terms core is designed to represent the intruder's knowledge compactly,and forward search technology is used to simulate attack patterns easily.Using this algorithm,a new attack on the Dolve-Yao protocol can be found,which is even more harmful beeause the secret is revealed before the session terminates.