Extraction of limit streamlines in 2D flow field using virtual boundary

Wenyao Zhang*, Jing Su

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

To describe the structure of a flow field and understand the flow field image, limit streamlines must be extracted. In this paper, we propose a new intelligent method to extract them automatically. This method is also based on topological analysis, but has the ability to extract open limit streamlines that are not captured by conventional topology-based methods. Given a 2D flow field, we extend it firstly by vector mirroring around its boundary, and then detect and classify the critical points in the extended field. All saddles among the critical points are selected to compute limit streamlines. Contributing to the boundary extending, open limit streamlines, if any one exists, are included in the resulting lines as well as the closed ones. Furthermore, our method can find out limit cycles at the same time without any modification. Test results show that our method significantly improves the extraction of limit streamlines.

Original languageEnglish
Title of host publicationCIS 2009 - 2009 International Conference on Computational Intelligence and Security
Pages171-175
Number of pages5
DOIs
Publication statusPublished - 2009
Event2009 International Conference on Computational Intelligence and Security, CIS 2009 - Beijing, China
Duration: 11 Dec 200914 Dec 2009

Publication series

NameCIS 2009 - 2009 International Conference on Computational Intelligence and Security
Volume1

Conference

Conference2009 International Conference on Computational Intelligence and Security, CIS 2009
Country/TerritoryChina
CityBeijing
Period11/12/0914/12/09

Keywords

  • Boundary extending of vector field
  • Limit cycles
  • Open limit streamlines
  • Topology analysis
  • Virtual boundary

Fingerprint

Dive into the research topics of 'Extraction of limit streamlines in 2D flow field using virtual boundary'. Together they form a unique fingerprint.

Cite this