Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Angular Spectrum Propagation (1)
- Atmospheric Propagation (1)
- Coherence Factor (1)
- Combustion (1)
- Electric propulsion (1)
-
- Fresnel Propagation (1)
- Hall Effect Thruster (1)
- LES (1)
- Large Eddy Simulation (1)
- Neural Networks (1)
- Phase Screens (1)
- Plasma Physics (1)
- Plumes (1)
- Quantum Key Distribution (1)
- Rayleigh-Summerfeld (1)
- STBLI (1)
- Shock Turbulent Boundary Layer (1)
- Spectral Solver (1)
- Statistical Optics (1)
- Structure Function (1)
- Tomography (1)
- Wall model (1)
Articles 1 - 4 of 4
Full-Text Articles in Physics
Reconstruction Of The 3d Temperature And Species Concentration Spatial Distribution Of A Jet Engine Exhaust Plume Using An Infrared Fourier Transform Spectrometer Hyperspectral Imager, Mason D. Paulec
Theses and Dissertations
The measurement of combustion byproducts is useful for determining pollution of any fuel burning application, efficiency of combustion, and determining detectability of aircraft exhausts. Both intrusive and non-intrusive techniques have been utilized to measure these quantities. For the majority of the non-intrusive techniques, the absorption and emission spectra of the gases are utilized for measurements. For this research, the use of the Telops Infrared Fourier Transform Spectrometer (IFTS) Hyperspectral Imager (HSI) was explored within the scope of combustion diagnostic methods, as an option for remote measurements of a jet turbine to determine concentration of species and temperature of the combustion …
Application Of Spectral Solution And Neural Network Techniques In Plasma Modeling For Electric Propulsion, Joseph R. Whitman
Application Of Spectral Solution And Neural Network Techniques In Plasma Modeling For Electric Propulsion, Joseph R. Whitman
Theses and Dissertations
A solver for Poisson's equation was developed using the Radix-2 FFT method first invented by Carl Friedrich Gauss. Its performance was characterized using simulated data and identical boundary conditions to those found in a Hall Effect Thruster. The characterization showed errors below machine-zero with noise-free data, and above 20% noise-to-signal strength, the error increased linearly with the noise. This solver can be implemented into AFRL's plasma simulator, the Thermophysics Universal Research Framework (TURF) and used to quickly and accurately compute the electric field based on charge distributions. The validity of a machine learning approach and data-based complex system modeling approach …
Wall-Modeled Large Eddy Simulation Of A Three-Dimensional Shock-Boundary Layer Interaction, Nicholas J. Marco
Wall-Modeled Large Eddy Simulation Of A Three-Dimensional Shock-Boundary Layer Interaction, Nicholas J. Marco
Theses and Dissertations
The direct simulation of turbulent flows is prohibitive at high Reynolds numbers; thus, methods such as RANS and LES are used. However, these methods still require a large number of cells near a solid boundary. To circumvent this issue, a Wall-Modeled Large Eddy Simulation (WM-LES) can be used. Of interest is how these wall models perform in comparison to a Wall-Resolved Large Eddy Simulation (WR-LES) and experimental results of a shock turbulent boundary layer interactions (STBLI) and specifically, whether equilibrium wall models are sufficient to resolve the oscillatory and hence non-equilibrium nature of these flows or whether a non-equilibrium model …
Modeling A Space-Based Quantum Link, Alexander W. Duchane
Modeling A Space-Based Quantum Link, Alexander W. Duchane
Theses and Dissertations
Quantum sources and single photon detectors have improved, allowing quantum algorithms for communication, encryption, computing, and sensing to transition from theory and small-scale laboratory experiments to field experiments. One such quantum algorithm, Quantum Key Distribution, uses optical pulses to generate shared random bit strings between two locations. These shared bit strings can be turned into encryption keys to be used as a one-time-pad or integrated with symmetric encryption techniques such as the Advanced Encryption Standard. This method of key generation and encryption is resistant to future advances in quantum computing which significantly degrade the effectiveness of current asymmetric key sharing …