Film cooling has dramatically contributed to the performance improvement of gas turbines, as it is a very effective cooling technique for gas turbines. Large eddy simulation (LES) began to be used in ...the study of film cooling 20 years ago, and meaningful results have been found, but it has not yet been intensively reviewed. In this review paper, we analyze and introduce about 70 papers published on LES of film cooling over the past 20 years. Numerical instability must be overcome, and realistic inflow must be generated to perform LES of film cooling. This review summarizes how the groups that performed LES of film cooling solved these problems. In film-cooling research, the main topics are improving the film-cooling performance by preventing the lift-off of the injectant and the effect of flow conditions on film cooling. In addition, LES has also been conducted extensively on the above two topics, and this review focuses on them. Finally, turbulence statistics of film-cooling flow obtained from LES are introduced, and future challenges of film-cooling LES are predicted.
Herein, 50 articles published over the past 20 years on using large eddy simulation (LES) for the internal cooling passage of a gas turbine, especially the mid-chord ribbed channel, are reviewed for ...the first time. First, the numerical challenges of performing LES on a ribbed channel and experimental verification are summarized. Next, LES data and the major engineering findings that are difficult to obtain experimentally or using Reynolds-averaged Navier–Stokes simulation (RANS) are covered, and heat transfer on and inside the rib, and the effects of rotation and buoyancy are discussed. Next, recent LES studies related to the shape of the ribbed channel are reviewed, and finally, the contribution of using LES for research on the internal cooling of gas turbines in the future, including those with ribbed channels, is anticipated.
The CRISPR/Cas9 technology has greatly progressed research on non‐model organisms, demonstrating successful applications in genome editing for various insects. However, its utilization in the case of ...the soybean looper, Chrysodeixis includens, a notable pest affecting soybean crops, has not been explored due to constraints such as limited genomic information and the embryonic microinjection technique. This study presents successful outcomes in generating heritable knockout mutants for a pigment transporter gene, scarlet, in C. includens through CRISPR/Cas9‐mediated mutagenesis. The scarlet locus identified in the genome assembly of C. includens consists of 14 exons, with a coding sequence extending for 1,986 bp. Two single guide RNAs (sgRNAs) were designed to target the first exon of scarlet. Microinjection of these two sgRNAs along with the Cas9 protein into fresh embryos resulted in the successful production of variable phenotypes, particularly mutant eyes. The observed mutation rate accounted for about 16%. Genotype analysis revealed diverse indel mutations at the target site, presumably originating from double‐strand breaks followed by the nonhomologous end joining repair, leading to a premature stop codon due to frame shift. Single‐pair mating of the mutant moths produced G1 offspring, and the establishment of a homozygous mutant strain occurred in G2. The mutant moths exhibited lightly greenish or yellowish compound eyes in both sexes, confirming the involvement of scarlet in pigmentation in C. includens. Notably, the CRISPR/Cas9‐mediated genome editing technique serves as a visible phenotypic marker, demonstrating its proof‐of‐concept applicability in C. includens, as other pigment transporter genes have been utilized as visible markers to establish genetic control for various insects. These results provide the first successful case that the CRISPR/Cas9 method effectively induces mutations in C. includes, an economically important soybean insect pest.
The pigment transporter gene, scarlet, was cloned from Chrysodeixis includens.
The knockout of scarlet using CRISPR/Cas9 method resulted in observable eye color mutations in adults.
The T7E1 assay and sequencing methods confirmed the heritable mutations up to G2 generation.
Research Highlights
The pigment transporter gene, scarlet, was cloned from Chrysodeixis includens.
The knockout of scarlet using CRISPR/Cas9 method resulted in observable eye color mutations in adults.
The T7E1 assay and sequencing methods confirmed the heritable mutations up to G2 generation.
A small relaxation of the axisymmetric magnetic field of a tokamak into a non-axisymmetric three-dimensional (3D) configuration can be effective to control magnetohydrodynamic instabilities, such as ...edge-localized modes. However, a major challenge to the concept of 3D tokamaks is that there are virtually unlimited possible choices for a 3D magnetic field, and most of them will only destabilize or degrade plasmas by symmetry breaking. Here, we demonstrate the phase-space visualization of the full 3D field-operating windows of a tokamak, which allows us to predict which configurations will maintain high confinement without magnetohydrodynamic instabilities in an entire region of plasmas. We test our approach at the Korean Superconducting Tokamak Advanced Research (KSTAR) facility, whose 3D coils with many degrees of freedom in the coil space make it unique for this purpose. Our experiments show that only a small subset of coil configurations can accomplish edge-localized mode suppression without terminating the discharge with core magnetohydrodynamic instabilities, as predicted by the perturbative 3D expansion of plasma equilibrium and the optimizing principle of local resonance. The prediction provided excellent guidance, implying that our method can substantially improve the efficiency and fidelity of the 3D optimization process in tokamaks.
Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud ...storage to support the scalability of service and data migration, in which we consider the existence of multiple cloud service providers to cooperatively store and maintain the clients' data. We present a cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy. We prove the security of our scheme based on multiprover zero-knowledge proof system, which can satisfy completeness, knowledge soundness, and zero-knowledge properties. In addition, we articulate performance optimization mechanisms for our scheme, and in particular present an efficient method for selecting optimal parameter values to minimize the computation costs of clients and storage service providers. Our experiments show that our solution introduces lower computation and communication overheads in comparison with noncooperative approaches.
The objective of this study is to design a heat-recovery boiler for a 1 MW-class gas engine-based cogeneration system intended to recover heat from engine exhaust gas. To accommodate high-pressure ...applications, a water tube-type boiler is selected. For ensuring effective water circulation within the boiler, an innovative modular-type boiler based on the mini-boiler concept is developed. This boiler comprises finned tube-type risers, and their heat-transfer characteristics are measured and compared with the conventional correlation used in the design process. Additionally, an inlet guide vane is developed to address the temperature nonuniformity resulting from the shape mismatch between the gas engine outlet and heat-recovery boiler inlet. The performance of the proposed boiler was evaluated by integrating it into an experimental rig. The diamond-shaped inlet guide vane, which was designed by computational fluid dynamics, facilitated a uniform temperature distribution. However, the temperature became nonuniform downstream owing to the influence of a downcomer. Although the modular heat-recovery boiler effectively produced steam from gas engine exhaust gasses, its heat-transfer performance in the downstream section was lower than expected, necessitating additional heat-transfer area.
Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users. These OSNs offer attractive means for digital ...social interactions and information sharing, but also raise a number of security and privacy issues. While OSNs allow users to restrict access to shared data, they currently do not provide any mechanism to enforce privacy concerns over data associated with multiple users. To this end, we propose an approach to enable the protection of shared data associated with multiple users in OSNs. We formulate an access control model to capture the essence of multiparty authorization requirements, along with a multiparty policy specification scheme and a policy enforcement mechanism. Besides, we present a logical representation of our access control model that allows us to leverage the features of existing logic solvers to perform various analysis tasks on our model. We also discuss a proof-of-concept prototype of our approach as part of an application in Facebook and provide usability study and system evaluation of our method.
Quantum states of quasiparticles in solids are dictated by symmetry. We experimentally demonstrate Dirac electrons in a two-dimensional quasicrystal without translational symmetry. A dodecagonal ...quasicrystalline order was realized by epitaxial growth of twisted bilayer graphene rotated exactly 30°. The graphene quasicrystal was grown up to a millimeter scale on an SiC (0001) surface while maintaining the single rotation angle over an entire sample and was successfully isolated from a substrate, demonstrating its structural and chemical stability under ambient conditions. Multiple Dirac cones replicated with the 12-fold rotational symmetry were observed in angle-resolved photoemission spectra, which revealed anomalous strong interlayer coupling with quasi-periodicity. Our study provides a way to explore physical properties of relativistic fermions with controllable quasicrystalline orders.
Intercalation forms heterostructures, and over 25 elements and compounds are intercalated into graphene, but the mechanism for this process is not well understood. Here, the de‐intercalation of 2D Ag ...and Ga metals sandwiched between bilayer graphene and SiC are followed using photoemission electron microscopy (PEEM) and atomistic‐scale reactive molecular dynamics simulations. By PEEM, de‐intercalation “windows” (or defects) are observed in both systems, but the processes follow distinctly different dynamics. Reversible de‐ and re‐intercalation of Ag is observed through a circular defect where the intercalation velocity front is 0.5 nm s−1 ± 0.2 nm s.−1 In contrast, the de‐intercalation of Ga is irreversible with faster kinetics that are influenced by the non‐circular shape of the defect. Molecular dynamics simulations support these pronounced differences and complexities between the two Ag and Ga systems. In the de‐intercalating Ga model, Ga atoms first pile up between graphene layers until ultimately moving to the graphene surface. The simulations, supported by density functional theory, indicate that the Ga atoms exhibit larger binding strength to graphene, which agrees with the faster and irreversible diffusion kinetics observed. Thus, both the thermophysical properties of the metal intercalant and its interaction with defective graphene play a key role in intercalation.
Ag (2D) and 2D Ga are initially intercalated into epitaxial graphene, and the de‐intercalation processes are markedly different from each other as followed by photoemission electron microscopy. Molecular dynamic simulations and calculations provide insight into the role of the intercalant—they induce different interactions with (defective) graphene with implications to defect healing and kinetics of the (de)intercalation process.
In recent years, we witnessed a drastic increase of ransomware, especially on popular mobile platforms including Android. Ransomware extorts victims for a sum of money by taking control of their ...devices or files. In light of their rapid growth, there is a pressing need to develop effective countermeasure solutions. However, the research community is still constrained by the lack of a comprehensive data set, and there exists no insightful understanding of mobile ransomware in the wild. In this paper, we focus on the Android platform and aim to characterize existing Android ransomware. Specifically, we have managed to collect 2,721 ransomware samples that cover the majority of existing Android ransomware families. Based on these samples, we systematically characterize them from several aspects, including timeline and malicious features. In addition, the detection results of existing anti-virus tools are rather disappointing, which clearly calls for customized anti-mobile-ransomware solutions. To detect ransomware that extorts users by encrypting data, we propose a novel real-time detection system, called RansomProber. By analyzing the user interface widgets of related activities and the coordinates of users' finger movements, RansomProber can infer whether the file encryption operations are initiated by users. The experimental results show that RansomProber can effectively detect encrypting ransomware with high accuracy and acceptable runtime performance.