Open Access. Powered by Scholars. Published by Universities.®

Physics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Physics

Reconstruction Of The 3d Temperature And Species Concentration Spatial Distribution Of A Jet Engine Exhaust Plume Using An Infrared Fourier Transform Spectrometer Hyperspectral Imager, Mason D. Paulec Sep 2018

Reconstruction Of The 3d Temperature And Species Concentration Spatial Distribution Of A Jet Engine Exhaust Plume Using An Infrared Fourier Transform Spectrometer Hyperspectral Imager, Mason D. Paulec

Theses and Dissertations

The measurement of combustion byproducts is useful for determining pollution of any fuel burning application, efficiency of combustion, and determining detectability of aircraft exhausts. Both intrusive and non-intrusive techniques have been utilized to measure these quantities. For the majority of the non-intrusive techniques, the absorption and emission spectra of the gases are utilized for measurements. For this research, the use of the Telops Infrared Fourier Transform Spectrometer (IFTS) Hyperspectral Imager (HSI) was explored within the scope of combustion diagnostic methods, as an option for remote measurements of a jet turbine to determine concentration of species and temperature of the combustion …


Application Of Spectral Solution And Neural Network Techniques In Plasma Modeling For Electric Propulsion, Joseph R. Whitman Sep 2018

Application Of Spectral Solution And Neural Network Techniques In Plasma Modeling For Electric Propulsion, Joseph R. Whitman

Theses and Dissertations

A solver for Poisson's equation was developed using the Radix-2 FFT method first invented by Carl Friedrich Gauss. Its performance was characterized using simulated data and identical boundary conditions to those found in a Hall Effect Thruster. The characterization showed errors below machine-zero with noise-free data, and above 20% noise-to-signal strength, the error increased linearly with the noise. This solver can be implemented into AFRL's plasma simulator, the Thermophysics Universal Research Framework (TURF) and used to quickly and accurately compute the electric field based on charge distributions. The validity of a machine learning approach and data-based complex system modeling approach …


Wall-Modeled Large Eddy Simulation Of A Three-Dimensional Shock-Boundary Layer Interaction, Nicholas J. Marco Mar 2018

Wall-Modeled Large Eddy Simulation Of A Three-Dimensional Shock-Boundary Layer Interaction, Nicholas J. Marco

Theses and Dissertations

The direct simulation of turbulent flows is prohibitive at high Reynolds numbers; thus, methods such as RANS and LES are used. However, these methods still require a large number of cells near a solid boundary. To circumvent this issue, a Wall-Modeled Large Eddy Simulation (WM-LES) can be used. Of interest is how these wall models perform in comparison to a Wall-Resolved Large Eddy Simulation (WR-LES) and experimental results of a shock turbulent boundary layer interactions (STBLI) and specifically, whether equilibrium wall models are sufficient to resolve the oscillatory and hence non-equilibrium nature of these flows or whether a non-equilibrium model …


Modeling A Space-Based Quantum Link, Alexander W. Duchane Mar 2018

Modeling A Space-Based Quantum Link, Alexander W. Duchane

Theses and Dissertations

Quantum sources and single photon detectors have improved, allowing quantum algorithms for communication, encryption, computing, and sensing to transition from theory and small-scale laboratory experiments to field experiments. One such quantum algorithm, Quantum Key Distribution, uses optical pulses to generate shared random bit strings between two locations. These shared bit strings can be turned into encryption keys to be used as a one-time-pad or integrated with symmetric encryption techniques such as the Advanced Encryption Standard. This method of key generation and encryption is resistant to future advances in quantum computing which significantly degrade the effectiveness of current asymmetric key sharing …