Experimental Study of the Runner Blade-to-Blade Shear Flow Turbulent Mixing in the Cone of Francis Turbine Scale Model
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
We study mixing and diffusion properties of passive scalars driven by generic rough shear flows. Genericity is here understood in the sense of prevalence, and (ir)regularity is measured in the Besov-Nikolskii scale B\alpha 1,\infty, \alpha \in (0,1). We pr ...
We characterise computationally and experimentally a three-dimensional (3D) microfluidic passive mixer for various Reynolds numbers ranging from 1 to 100, corresponding to primary flow rates of 10-870 mu l min(-1). The 3D mixing channel is composed of mult ...
Tetrachloroethene (PCE) represents a major groundwater pollutant. Some bacteria are able to use PCE as electron acceptor in an anaerobic respiration process called organohalide respiration (OHR). An anaerobic enrichment culture (named SL2-PCEb) consisting ...
Byzantine machine learning (ML) aims to ensure the resilience of distributed learning algorithms to misbehaving (or Byzantine) machines. Although this problem received significant attention, prior works often assume the data held by the machines to be homo ...
We review the state of knowledge on the bio-fluid dynamic mechanisms involved in the transmission of the infection from SARS-CoV-2. The relevance of the subject stems from the key role of airborne virus transmission by viral particles released by an infect ...
Nanoparticles and method for producing uniform silicate-based nanoparticles are disclosed. The method comprises a step of injecting into tubular branched elements comprising static mixers a first aqueous solution comprising a water-soluble silicate compoun ...
In the first part, we first introduce steganography (in chapter 1) not in the usual context of information security, but as a method to piggyback data on top of some content. We then focus on audio steganography and propose a new steganographic scheme in c ...
The present study defines a procedure for gaining a better understanding of the interaction between the aged and the virgin binders and what actually occurs during a mix process. Indeed, the authors propose a methodology to determine and quantify the clust ...
Nowadays, the production in fine chemical and pharmaceutical industry is mostly carried out in large scale batch reactors having typically dimensions of a few meters to satisfy the demand of the market. Even though this technology has been widely used and ...
Contained density currents with high volume of release reflect against the boundaries of the reception environment commonly leading to oscillatory flow. These flows exist in sediment clarifiers, compromising their operations, and deposited signatures of co ...