Academia.eduAcademia.edu

LES and DNS

description951 papers
group18,460 followers
lightbulbAbout this topic
LES (Large Eddy Simulation) and DNS (Direct Numerical Simulation) are computational fluid dynamics techniques used to model turbulent flows. LES resolves large-scale turbulent structures while modeling smaller scales, whereas DNS solves the Navier-Stokes equations directly for all scales, providing highly detailed flow information but requiring significant computational resources.
lightbulbAbout this topic
LES (Large Eddy Simulation) and DNS (Direct Numerical Simulation) are computational fluid dynamics techniques used to model turbulent flows. LES resolves large-scale turbulent structures while modeling smaller scales, whereas DNS solves the Navier-Stokes equations directly for all scales, providing highly detailed flow information but requiring significant computational resources.

Key research themes

1. How can Named Data Networking (NDN) architectures address scalability, resource allocation, and load balancing challenges in content and service delivery?

Research in this area focuses on architectural and algorithmic solutions in NDN to efficiently manage resources such as memory and processing power, handle service request load balancing among dynamic service instances, and optimize caching strategies to improve user satisfaction and network efficiency. These challenges are critical because NDN names variable-length content rather than fixed-length IP addresses, and services differ significantly from static content due to computational demands and limited caching benefits.

Key finding: This study introduces 'Radient,' a novel name encoding scheme targeting the Pending Interest Table (PIT) in NDN routers, reducing memory consumption by 35.45% compared to previous encoding techniques for 29 million names. By... Read more
Key finding: This paper identifies that NDN's service requests, unlike static content, require computational resources and vary greatly in execution time, with limited benefits from caching. The authors survey conventional load balancing,... Read more
Key finding: This paper proposes RADC, which uses Multinomial Naïve Bayes classification to categorize requested content followed by adaptive resource allocation via a Lagrange utility function to manage caching fairness in NDN nodes. The... Read more

2. What are the evolving roles, security challenges, and mitigations related to the Domain Name System (DNS) and its integration with emerging Internet paradigms and Internet of Things (IoT)?

This research theme studies DNS's fundamental role as the Internet's naming service and how it adapts or is challenged by developments such as DNS security vulnerabilities, DNS-based distributed denial-of-service (DDoS) attacks, privacy concerns via query minimization, and applicability in IoT contexts with constrained devices. It also surveys practical mitigations like DNSSEC for security breaches and examines the impact of DNS-based server selection on latency and network efficiency.

Key finding: This overview outlines how botnets exploit DNS vulnerabilities to launch Distributed Denial of Service (DDoS) amplification and reflection attacks, severely impacting DNS infrastructure availability. It clarifies that DNS... Read more
Key finding: Through implemented scenarios of zone transfer and cache poisoning attacks, this research confirms that DNSSEC effectively prevents such attacks by enforcing cryptographic validation of DNS responses. DNSSEC denies... Read more
Key finding: This work introduces QNAME minimisation, a privacy-enhancing technique where DNS resolvers send only the minimal necessary domain name components to authoritative servers rather than the full query name. By querying only the... Read more
Key finding: This survey highlights how DNS's robustness and security extensions could support the Internet of Things (IoT) in address resolution and identification despite numerous challenges like constrained device resources, diverse... Read more
Key finding: This study critically evaluates DNS-based server selection mechanisms tying client redirection to DNS server location, revealing two major issues: (1) reducing DNS record TTLs degrades caching benefits significantly,... Read more

3. What are the security vulnerabilities and mitigation strategies for Named Data Networking (NDN) and Information-Centric Networking (ICN) architectures?

This theme covers the analysis and mitigation of intrinsic and emerging security challenges unique to NDN/ICN architectures, including implicit denial-of-service via request aggregation and multicast forwarding, access control policies adapted for content-centric environments, and general security threats arising from naming, caching, and routing paradigms intrinsic to ICN. Research aims to understand how content-centric paradigms affect trust, authentication, and availability, proposing both architectural and cryptographic solutions.

Key finding: This study identifies an implicit DoS vulnerability caused by NDN's request aggregation combined with multicast forwarding and loop detection via nonce reuse (iDoS). The paper proposes and evaluates three mitigation... Read more
Key finding: This comprehensive survey examines access control (AC) in NDN's content-centric paradigm, contrasting with TCP/IP's client-server AC model. It identifies challenges that arise due to the decoupling of content from locations... Read more
Key finding: This article surveys security challenges related to naming in ICN architectures, emphasizing that content-naming introduces new vulnerabilities such as content poisoning, route hijacking, and privacy threats. It proposes a... Read more

All papers in LES and DNS

Wind turbines operate in the surface layer of the atmospheric boundary layer, where they are subjected to strong wind shear and relatively high turbulence levels. These incoming boundary layer flow characteristics are expected to affect... more
A numerical methodology to simulate two-phase electrohydrodynamic flows under the volume-of-fluid paradigm is proposed. The electric force in such systems acts only at the interface and is zero elsewhere in the two fluids. Continuum... more
This paper presents a comparative study for the weakly compressible (WCSPH) and incompressible (ISPH) smoothed particle hydrodynamics methods by providing numerical solutions for fluid flows over an airfoil and a square obstacle. Improved... more
We derive and analyze a model for implicit Large Eddy Simulation (LES) of compressible flows that is applicable to a broad range of Mach numbers and particularly efficient for LES of shock-turbulence interaction. Following a holistic... more
Objective: While the correlation of atherosclerotic plaque locations with local wall shear stress magnitude has been evaluated previously by other investigators in both right (RCA) and left coronary arteries (LCA), the relative... more
An efficient numerical scheme to compute flows past rigid solid bodies moving through viscous incompressible fluid is presented. Solid obstacles of arbitrary shape are taken into account using the volume penalization method to impose... more
In this paper, we investigate the high-speed dynamics of symmetric and asymmetric cavitation bubble-collapse. For this purpose, a sharp-interface numerical model is employed, that includes a numerically effi-cient evaporation/condensation... more
The aim of this paper is to present an experimental and numerical investigation of dam-break flow over initially dry bed with a bottom obstacle. This test case highlights not only the bottom slope effects but also those of abrupt change... more
The importance of three-dimensional effects for flapping wings is addressed by means of numerical simulation. In particular, the clap–fling–sweep mechanism is examined. The flow at the beginning of the downstroke is shown to be in reason... more
Journal Homepage: http://pof.aip.org/ Journal Information: http://pof.aip.org/about/about_the_journal Top downloads: http://pof.aip.org/features/most_downloaded Information for Authors: http://pof.aip.org/authors Downloaded 22 Jul 2013 to... more
A numerical algorithm for the simulation of flow past immersed objects with heat transfer is proposed and validated which conforms with the ideas of the fictitious domain method. A momentum source term is added to account for the presence... more
by Lin Fu
The interaction between an incident shock wave and a Mach-6 undisturbed hypersonic laminar boundary layer over a cold wall is addressed using direct numerical simulations (DNS) and wall-modeled large-eddy simulations (WMLES) at different... more
This paper describes a scenario of transition from laminar to turbulent flow in a spatially developing boundary layer over a flat plate. The base flow is the Blasius non-parallel flow solution; it is perturbed by optimal disturbances... more
"We present the development of a sliding mesh capability for an unsteady high order (order>3) h/p Discontinuous Galerkin solver for the three-dimensional incompressible Navier-Stokes equations. A high order sliding mesh method is... more
The purpose of this paper is to evaluate the accuracy of the mesoscopic approach proposed by Février et al. [P. Février, O. Simonin, K.D. Squires, Partitioning of particle velocities in gas–solid turbulent flows into a continuous field... more
In the framework of the IAVCEI (International Association of Volcanology and Chemistry of the Earth Interior) in-tercomparison study on volcanic plume models, we present three-dimensional (3D) numerical simulations carried out with the... more
The present work is dedicated to the numerical study of statistical characteristics of spatially-evolving supersonic turbulent boundary layers (STBL) with cooled walls. Large-Eddy Simulations (LESs) are performed to gain further insight... more
An approach for Eulerian–Lagrangian large-eddy simulation of bubble plume dynamics is presented and its performance evaluated. The main numerical novelties consist on defining the gas-liquid coupling based on the bubble size to mesh... more
In this paper we establish a benchmark data set of a generic high-pressure turbine vane generated by direct numerical simulation (DNS) to resolve fully the flow. The test conditions for this case are a Reynolds number of 0.57 million and... more
Momentum and heat transfer characteristics of a semi-circular cylinder immersed in unconfined flowing Newtonian fluids have been investigated numerically. The governing equations, namely, continuity, Navier-Stokes and energy, have been... more
In this research, we numerically investigate the physics of pulsatile flows confined within a 3-dimensional channel with a modelled stenosis formed eccentrically on the upper wall using the method of large-eddy simulation (LES). An... more
In this study, the melting process of ice as a phase-change material (PCM) saturated with a nickel– steel porous matrix inside a horizontal elliptical tube is investigated. Due to the low thermal conductivity of the PCM, it is motivated... more
problem of an incompressible two-phase immiscible fluid in a stratified inviscid shear flow with interfacial tension. The time-dependent evolution of the two-fluid interface over a wide range of Richardson number (Ri) and for three... more
— This work reports investigations on Diesel spray transients, accounting for internal nozzle flow and needle motion, and demonstrates how seamless calculations of internal flow and external jet can be accomplished in a Large-Eddy... more
To study the mixed convection flows in a square double lid-driven cavity with various inclination angles, a numerical method based on the finite volume method is used. In this investigation Al2O3/water nanofluid with particle diameter of... more
A reliable and efficient aerodynamic design optimization tool using evolutionary algorithm has been developed for transonic compressor blades. A real-coded adaptive-range genetic algorithm is used to improve efficiency and robustness in... more
Direct numerical simulations (DNS) of supersonic turbulent boundary layers (STBL) over adiabatic and isothermal walls are performed to investigate the effects of wall heat transfer on turbulent statistics and near wall behaviors. Four... more
The effect of wind turbine blade tip geometry is numerically analysed using Computational Fluid Dynamics (CFD). Three different rotating blade tips are compared for attached flow conditions and the flow physics around the geometries are... more
Atmospheric motions are governed by turbulent motions associated to nontrivial energy transfers at small scales (direct cascade) and/or at large scales (inverse cascade). Although it is known that the two cascades coexist, energy fluxes... more
Over the last decade the adjoint method has been consolidated as one of the most versatile and successful tools for aerodynamic design. It has become a research area on its own, spawning a large variety of applications and a prolific... more
A fundamental study has been performed to understand the effect of unsteady forcing on turbulence statistics in channel flow with rough walls using direct numerical simulation. Unsteady flows have been generated by applying an unsteady... more
Extensive numerical results on the flow and thermal fields are presented for free convection from a semicircular cylinder (flat base upward) immersed in quiescent power-law fluids for the following ranges of conditions: Grashof number, 10... more
The continuity, momentum and energy equations describing the flow and heat transfer of power-law fluids over a semi-circular cylinder have been solved numerically in the two-dimensional steady flow regime. The influence of the Reynolds... more
Turbulent flows over rough surfaces are encountered in many engineering and geo- physical applications. Flows of this nature, due to their increasing technological interests, have been a subject of rigorous investigation in recent years.... more
We investigate a passive flow-control technique for the interaction of an oblique shock generated by an 8.8° wedge with a turbulent boundary-layer at a free-stream Mach number of Ma∞=2.3 and a Reynolds number based on the incoming... more
Rotor tip-clearance induced noise, both in the form of rotor self noise and rotor-stator interaction noise, constitutes a significant component of total fan noise. Innovative yet cost effective techniques to suppress rotor-generated noise... more
In this work, the governing partial differential equations (continuity and Cauchy's momentum equations) describing the flow of power-law type non-Newtonian fluids across a semicircular cylinder (oriented with its curved surface in the... more
We present a new numerical scheme for the simulation of deformable objects immersed in a viscous incompressible fluid. The two-dimensional Navier-Stokes equations are discretized with an efficient Fourier pseudo-spectral scheme. Using the... more
A fundamental study was conducted to shed light on entrainment and mixing in buoyancy-driven Boussinesq density currents. Large-eddy simulation was performed on lock-exchange (LE) release density currents—an idealized test bed to generate... more
This work provides a global optimization analysis, looking for perturbations inducing the largest energy growth at a finite time in a boundary-layer flow in the presence of smooth three-dimensional roughness elements. Amplification... more
Large eddy simulation (LES) runs are performed to calculate flows over heterogeneous surfaces imitating small forest lakes. Regularities in the turbulent exchange of heat and momentum over such objects are examined. A weak sensitivity of... more
Re´sume´-Conditions aux limites et mode`les SGS pour les simulations LES d'e´coulements se´pare´s de´limite´s par des parois : une application aux ge´ome´tries de type moteur -L'imple´mentation et la combinaison de conditions aux limites... more
This paper presents a mesh adaptation scheme for direct minimization of output error using a selection process for choosing the optimal refinement option from a discrete set of choices. The scheme is geared for viscous aerodynamic... more
Direct numerical simulations are used to study the postformation evolution of a laminar vortex ring. The vortex structure is described by calculating the embedded boundaries of the vortex inner core, vortex core, and vortex bubble. The... more
The evaluation of the dispersion in vegetated beds may allow indentifying mechanisms that affect the transport and reaction of solutes, namely organic and nitrogen compounds. A set of non-reactive tracer experiments (slag injection) was... more
Whilst electrohydrodynamic (EHD) flow actuation of dielectric fluids has been widely demonstrated, the fundamental mechanisms responsible for their behaviour is not well understood. By highlighting key distinguishing features of the... more
This study focuses on the dispersion and diffusion characteristics of high-order energy-stable flux reconstruction (ESFR) schemes via the spatial eigensolution analysis framework proposed in [1]. The analysis is performed for five ESFR... more
Phone Number: 0 (+33) 232 959 794, Fax Number: 0 (+33) 232 959 780 ABSTRACT In a recent paper by Zhang et al. (2012), a Mach number-invariant scaling was proposed to account for the effect of variation of free-stream Mach number in... more
Download research papers for free!