Solution Of Fully-Coupled Shallow Water Equations And Contaminant Transport Using A Primitive Variable Riemann Solver And A Semi-Discrete Supg Method, 2016 University of Tennessee at Chattanooga

#### Solution Of Fully-Coupled Shallow Water Equations And Contaminant Transport Using A Primitive Variable Riemann Solver And A Semi-Discrete Supg Method, Faranak Behzadi

*Masters Theses and Doctoral Dissertations*

In the present dissertation, a finite volume and a finite element model are developed and tuned for the solution of the fully-coupled two-dimensional Shallow Water and Contaminant transport Equations with arbitrary bed topography and wetting-drying fronts. A Riemann-solver finite volume scheme, using primitive variables rather than conserved variables, and a semi-discrete Streamline Upwind Petrov-Galerkin (SUPG) method in finite element context are applied to compare the performance of these two numerical models. The Riemann-solver scheme is based on the unstructured finite volume discretization using primitive-variable Roe-flux approximation with an entropy fix. Second-order accuracy in space and time, an implicit scheme based ...

Least Squares Spectral Element Method For Laminar And Turbulent Flows, –Continuous And Discontinuous Approaches–, 2016 University of Tennessee at Chattanooga

#### Least Squares Spectral Element Method For Laminar And Turbulent Flows, –Continuous And Discontinuous Approaches–, Jaber Javanshir Hasbestan

*Masters Theses and Doctoral Dissertations*

In this research, application of a least squares spectral element method for compressible laminar and turbulent flow problems is investigated. For the turbulent Reynolds Averaged Navier-Stokes (RANS), a modified Spalart-Allmaras (SA) turbulence model is employed and integrated with the mean flow equations in a segregated fashion. Two different approaches are presented for solving the SA model using the least squares method. The first method represents a simple rearrangement of the equation. However, proper arrangement of the SAmodel is required in order to produce a stable scheme for the least squares methodology. The second approach is into divide the SA equation ...

Strategies For Protecting Intellectual Property When Using Cuda Applications On Graphics Processing Units, 2016 Abertay University

#### Strategies For Protecting Intellectual Property When Using Cuda Applications On Graphics Processing Units, Xavier Bellekens

*xavier bellekens*

Energy Consumption Prediction With Big Data: Balancing Prediction Accuracy And Computational Resources, 2016 Western University

#### Energy Consumption Prediction With Big Data: Balancing Prediction Accuracy And Computational Resources, Katarina Grolinger, Miriam Am Capretz, Luke Seewald

*Electrical and Computer Engineering Publications*

In recent years, advances in sensor technologies and expansion of smart meters have resulted in massive growth of energy data sets. These Big Data have created new opportunities for energy prediction, but at the same time, they impose new challenges for traditional technologies. On the other hand, new approaches for handling and processing these Big Data have emerged, such as MapReduce, Spark, Storm, and Oxdata H2O. This paper explores how findings from machine learning with Big Data can benefit energy consumption prediction. An approach based on local learning with support vector regression (SVR) is presented. Although local learning itself is ...

Polynomial Extension Operators. Part Iii, 2016 University of Texas at Austin

#### Polynomial Extension Operators. Part Iii, Leszek Demkowicz, Jay Gopalakrishnan, Joachim Schöberl

*Jay Gopalakrishnan*

In this concluding part of a series of papers on tetrahedral polynomial extension operators, the existence of a polynomial extension operator in the Sobolev space H(div) is proven constructively. Specifically, on any tetrahedron K, given a function w on the boundary ∂K that is a polynomial on each face, the extension operator applied to w gives a vector function whose components are polynomials of at most the same degree in the tetrahedron. The vector function is an extension in the sense that the trace of its normal component on the boundary ∂K coincides with w. Furthermore, the extension operator ...

Polynomial Extension Operators. Part Iii, 2016 University of Texas at Austin

#### Polynomial Extension Operators. Part Iii, Leszek Demkowicz, Jay Gopalakrishnan, Joachim Schöberl

*Jay Gopalakrishnan*

In this concluding part of a series of papers on tetrahedral polynomial extension operators, the existence of a polynomial extension operator in the Sobolev space H(div) is proven constructively. Specifically, on any tetrahedron K, given a function w on the boundary ∂K that is a polynomial on each face, the extension operator applied to w gives a vector function whose components are polynomials of at most the same degree in the tetrahedron. The vector function is an extension in the sense that the trace of its normal component on the boundary ∂K coincides with w. Furthermore, the extension operator ...

A Class Of Discontinuous Petrov–Galerkin Methods. Part Iii: Adaptivity, 2016 University of Texas at Austin

#### A Class Of Discontinuous Petrov–Galerkin Methods. Part Iii: Adaptivity, Leszek Demkowicz, Jay Gopalakrishnan, Antti H. Niemi

*Jay Gopalakrishnan*

We continue our theoretical and numerical study on the Discontinuous Petrov–Galerkin method with optimal test functions in context of 1D and 2D convection-dominated diffusion problems and hp-adaptivity. With a proper choice of the norm for the test space, we prove robustness (uniform stability with respect to the diffusion parameter) and mesh-independence of the energy norm of the FE error for the 1D problem. With hp-adaptivity and a proper scaling of the norms for the test functions, we establish new limits for solving convection-dominated diffusion problems numerically: for 1D and for 2D problems. The adaptive process is fully automatic and ...

Commuting By Customized Bus: A Comparative Analysis With Private Car And Conventional Public Transport In Two Cities, 2016 University of Auckland

#### Commuting By Customized Bus: A Comparative Analysis With Private Car And Conventional Public Transport In Two Cities, Tao Liu, Avishai Ceder, Romain Bologna, Benjamin Cabantous

*Journal of Public Transportation*

Commuting is a major component in the creation of traffic and travel problems. Thus, more attention should be given to its practice. Private car (PC) transport, the dominant mode of commuting in most of the world’s major cities, creates traffic-related social problems such as traffic congestion, traffic fatalities and injuries, and adverse environmental impacts. This study proposes a novel commuting travel mode—a customized bus (CB) transit system that provides advanced, personalized, and flexible demand-interactive minibus service using Internet, telephone, and smartphone apps. The aim was to assess and compare the performance of CB with PC and with conventional ...

Cashtag Ios Application, 2016 California Polytechnic State University, San Luis Obispo

#### Cashtag Ios Application, Kevin J. Tsui

*Computer Science*

An iOS Application meant to help manage cash purchases/transactions.

High-Low, 2016 California Polytechnic State University, San Luis Obispo

#### High-Low, Cameron Burwell, Bryce Cheng-Campbell

*Computer Science*

The card game High-Low is a cooperative game that provides a unique problem of where all players have partial information and build off other players guesses to win the game. This problem lends itself to creating an AI bot that can play the game with other human players. By making decisions that change as the other players make guesses through the rounds, we have created an AI bot that plays the game with a good degree of accuracy.

Automatic Generation And Grading Of Programming Exercises, 2016 California Polytechnic State University, San Luis Obispo

#### Automatic Generation And Grading Of Programming Exercises, Andrew Dufrene

*Computer Science*

In our current age of technological advances, and rising education costs, it is becoming increasingly beneficial to use technology to aid in education, usually through automated lectures or grading. One missing feature from this automated education is complex grading and problem generation. The main objective of this project is to create a program that can automatically generate and grade problems of varying difficulties based on the topic of programming for loops. The project solution was created as a program designed for use in Dr. Clinton Staley’s Intelligent Homework System, which is used precisely for automated exercise grading and generation ...

The Effects Of Latency On 3d Interactive Data Visualizations, 2016 California Polytechnic State University, San Luis Obispo

#### The Effects Of Latency On 3d Interactive Data Visualizations, Allen Korenevsky

*Master's Theses and Project Reports*

Interactive data visualizations must respond fluidly to user input to be effective, or so we assume. In fact it is unknown exactly how fast a visualization must run to present every facet within a dataset. An engineering team with limited resources is left with intuition and estimates to determine if their application performs sufficiently well.

This thesis studies how latency affects users' comprehension of data visualizations, specifically 3D geospatial visualizations with large data sets. Subjects used a climate visualization showing temperatures spanning from the 19th to the 21st century to answer multiple choice questions. Metrics like their eye movements, time ...

Anex: Automated Network Exploitation Through Penetration Testing, 2016 California Polytechnic State University, San Luis Obispo

#### Anex: Automated Network Exploitation Through Penetration Testing, Eric Francis Dazet

*Master's Theses and Project Reports*

Cyber attacks are a growing concern in our modern world, making security evaluation a critical venture. Penetration testing, the process of attempting to compromise a computer network with controlled tests, is a proven method of evaluating a system's security measures. However, penetration tests, and preventive security analysis in general, require considerable investments in money, time, and labor, which can cause them to be overlooked. Alternatively, automated penetration testing programs are used to conduct a security evaluation with less user effort, lower cost, and in a shorter period of time than manual penetration tests. The trade-off is that automated penetration ...

User-Composable Electronic Health Record Improves Efficiency Of Clinician Data Viewing For Patient Case Appraisal: A Mixed-Methods Study, 2016 SUNY Downstate Medical Center

#### User-Composable Electronic Health Record Improves Efficiency Of Clinician Data Viewing For Patient Case Appraisal: A Mixed-Methods Study, Yalini Senathirajah, David R. Kaufman, Suzanne R. Bakken

*eGEMs (Generating Evidence & Methods to improve patient outcomes)*

**Background:** Challenges in the design of electronic health records (EHRs) include designing usable systems that must meet the complex, rapidly changing, and high-stakes information needs of clinicians. The ability to move and assemble elements together on the same page has significant human-computer interaction (HCI) and efficiency advantages, and can mitigate the problems of negotiating multiple fixed screens and the associated cognitive burdens.

**Objective: **We compare** **MedWISE—a novel EHR that supports user-composable displays—with a conventional EHR in terms of** **the number of repeat views of data elements for patient case appraisal.** **

**Design and Methods: **The study used mixed-methods for ...

Optical Analysis And Fabrication Of Micro And Nanoscale Plasmonically Enhanced Devices, 2016 University of Arkansas, Fayetteville

#### Optical Analysis And Fabrication Of Micro And Nanoscale Plasmonically Enhanced Devices, Avery M. Hill

*Physics Undergraduate Honors Theses*

Plasmonic nanostructures have been shown to act as optical antennas that enhance optical devices due to their ability to focus light below the diffraction limit of light and enhance the intensity of the incident light. This study focuses on computational electromagnetic (CEM) analysis of two devices: 1) GaAs photodetectors with Au interdigital electrodes and 2) Au thin-film microstructures. Experiments showed that the photoresponse of the interdigital photodetectors depend greatly on the electrode gap and the polarization of the incident light. Smaller electrode gap and transverse polarization give rise to a larger photoresponse. It was also shown that the response from ...

Droplet Generation At Megahertz Frequencies, 2016 University of Arkansas, Fayetteville

#### Droplet Generation At Megahertz Frequencies, John C. Miers

*Mechanical Engineering Undergraduate Honors Theses*

Droplet formation has been a fascinating subject to scientists for centuries due to its natural beauty and importance to both scientific and industrial applications, such as inkjet printing, reagent deposition, and spray cooling. However, the droplet generation frequency of common drop-on-demand jetting techniques is mostly limited to ~10 kHz. This paper presents an investigation of the possibility of jetting at megahertz frequencies in order to boost the productivity of drop-on-demand material deposition by ~100 times. The focus of this paper is to understand the limitations of generating droplets at a megahertz frequency and to explore possible solutions for overcoming these ...

A Stabilized Finite Element Dynamic Overset Method For The Navier-Stokes Equations, 2016 University of Tennessee at Chattanooga

#### A Stabilized Finite Element Dynamic Overset Method For The Navier-Stokes Equations, Chao Liu

*Masters Theses and Doctoral Dissertations*

In terms of mesh resolution requirements, higher-order finite element discretization methods offer a more economic means of obtaining accurate simulations and/or to resolve physics at scales not possible with lower-order schemes. For simulations that may have large relative motion between multiple bodies, overset grid methods have demonstrated distinct advantages over mesh movement strategies. Combining these approaches offers the ability to accurately resolve the flow phenomena and interaction that may occur during unsteady moving boundary simulations. Additionally, overset grid techniques when utilized within a finite element setting mitigate many of the difficulties encountered in finite volume implementations. This research presents ...

Numerical Investigation Of Full Scale Thunderstorm Downbursts: A Parametric Study And Comparison To Meteorological Model, 2016 The University of Western Ontario

#### Numerical Investigation Of Full Scale Thunderstorm Downbursts: A Parametric Study And Comparison To Meteorological Model, Christopher Oreskovic

*Electronic Thesis and Dissertation Repository*

A series of Large Eddy Simulations using an atmospheric meteorological cloud model have been used to investigate the important geometric and thermal parameters that influence a thunderstorm downburst outflow, as it pertains specifically to the idealized cooling source model. A separate set of Large Eddy Simulations make use of the same idealized cooling source model, in a realistic atmospheric base state using real field sounding data, in an attempt to make a quantifiable comparison to a downburst from a full cloud simulation. Randomness has been added to the cooling source forcing function to mimic the thermal variation in a real ...

Strategic Cyberwar Theory - A Foundation For Designing Decisive Strategic Cyber Operations, 2016 United States Military Academy and Army Cyber Institute at West Point

#### Strategic Cyberwar Theory - A Foundation For Designing Decisive Strategic Cyber Operations, Jan Kallberg

*Jan Kallberg*

A Model For Complex Heat And Mass Transport Involving Porous Media With Related Applications, 2016 The University of Western Ontario

#### A Model For Complex Heat And Mass Transport Involving Porous Media With Related Applications, Furqan A. Khan

*Electronic Thesis and Dissertation Repository*

Heat and mass transfer involving porous media is prevalent in, for example, air-conditioning, drying, food storage, and chemical processing. Such applications require non-equilibrium heat and mass (or moisture) transfer modeling inside porous media in conjugate fluid/porous/solid framework. Moreover, modeling of turbulence and turbulent heat and mass transfer becomes essential for many applications. A comprehensive literature review shows a scarcity of models having such capabilities. In this respect, the objectives of the present thesis are to: i) develop a formulation that simulates non-equilibrium heat and mass transfer in conjugate fluid/porous/solid framework, ii) demonstrate the capabilities of the ...