14 resultados para asymptotic preserving
em Universidad Politécnica de Madrid
Resumo:
An analytical solution of the two body problem perturbed by a constant tangential acceleration is derived with the aid of perturbation theory. The solution, which is valid for circular and elliptic orbits with generic eccentricity, describes the instantaneous time variation of all orbital elements. A comparison with high-accuracy numerical results shows that the analytical method can be effectively applied to multiple-revolution low-thrust orbit transfer around planets and in interplanetary space with negligible error.
Resumo:
The computation of the non-linear vibration dynamics of an aerodynamically unstable bladed-disk is a formidable numerical task, even for the simplified case of aerodynamic forces assumed to be linear. The nonlinear friction forces effectively couple dif- ferent travelling waves modes and, in order to properly elucidate the dynamics of the system, large time simulations are typically required to reach a final, saturated state. Despite of all the above complications, the output of the system (in the friction microslip regime) is basically a superposition of the linear aeroelastic un- stable travelling waves, which exhibit a slow time modulation that is much longer than the elastic oscillation period. This slow time modulation is due to both, the small aerodynamic effects and the small nonlinear friction forces, and it is crucial to deter- mine the final amplitude of the flutter vibration. In this presenta- tion we apply asymptotic techniques to obtain a new simplified model that captures the slow time dynamics of the amplitudes of the travelling waves. The resulting asymptotic model is very re- duced and extremely cheap to simulate, and it has the advantage that it gives precise information about the characteristics of the nonlinear friction models that actually play a role in the satura- tion of the vibration amplitude.
Resumo:
Reverberation chambers are well known for providing a random-like electric field distribution. Detection of directivity or gain thereof requires an adequate procedure and smart post-processing. In this paper, a new method is proposed for estimating the directivity of radiating devices in a reverberation chamber (RC). The method is based on the Rician K-factor whose estimation in an RC benefits from recent improvements. Directivity estimation relies on the accurate determination of the K-factor with respect to a reference antenna. Good agreement is reported with measurements carried out in near-field anechoic chamber (AC) and using a near-field to far-field transformation.
Resumo:
The computation of the non-linear vibration dynamics of an aerodynamically unstable bladed-disk is a formidable numerical task, even for the simplified case of aerodynamic forces assumed to be linear. The nonlinear friction forces effectively couple dif- ferent travelling waves modes and, in order to properly elucidate the dynamics of the system, large time simulations are typically required to reach a final, saturated state. Despite of all the above complications, the output of the system (in the friction microslip regime) is basically a superposition of the linear aeroelastic un- stable travelling waves, which exhibit a slow time modulation that is much longer than the elastic oscillation period. This slow time modulation is due to both, the small aerodynamic effects and the small nonlinear friction forces, and it is crucial to deter- mine the final amplitude of the flutter vibration. In this presenta- tion we apply asymptotic techniques to obtain a new simplified model that captures the slow time dynamics of the amplitudes of the travelling waves. The resulting asymptotic model is very re- duced and extremely cheap to simulate, and it has the advantage that it gives precise information about the characteristics of the nonlinear friction models that actually play a role in the satura- tion of the vibration amplitude.
Resumo:
Analytical expressions for current to a cylindrical Langmuir probe at rest in unmagnetized plasma are compared with results from both steady-state Vlasov and particle-in-cell simulations. Probe bias potentials that are much greater than plasma temperature (assumed equal for ions and electrons), as of interest for bare conductive tethers, are considered. At a very high bias, both the electric potential and the attracted-species density exhibit complex radial profiles; in particular, the density exhibits a minimum well within the plasma sheath and a maximum closer to the probe. Excellent agreement is found between analytical and numerical results for values of the probe radiusR close to the maximum radius Rmax for orbital-motion-limited (OML) collection at a particular bias in the following number of profile features: the values and positions of density minimum and maximum, position of sheath boundary, and value of a radius characterizing the no-space-charge behavior of a potential near the high-bias probe. Good agreement between the theory and simulations is also found for parametric laws jointly covering the following three characteristic R ranges: sheath radius versus probe radius and bias for Rmax; density minimum versus probe bias for Rmax; and (weakly bias-dependent) current drop below the OML value versus the probe radius for R > Rmax.
Resumo:
We consider a simplified system of a growing colony of cells described as a free boundary problem. The system consists of two hyperbolic equations of first order coupled to an ODE to describe the behavior of the boundary. The system for cell populations includes non-local terms of integral type in the coefficients. By introducing a comparison with solutions of an ODE's system, we show that there exists a unique homogeneous steady state which is globally asymptotically stable for a range of parameters under the assumption of radially symmetric initial data.
Resumo:
Suslin analytic sets characterize the sets of asymptotic values of entire holomorphic functions. By a theorem of Ahlfors, the set of asymptotic values is finite for a function with finite order of growth. Quasiregular maps are a natural generalization of holomorphic functions to dimensions n ≥ 3 and, in fact, many of the properties of holomorphic functions have counterparts for quasiregular maps. It is shown that analytic sets also characterize the sets of asymptotic values of quasiregular maps in Rn, even for those with finite order of growth. Our construction is based on Drasin's quasiregular sine function
Resumo:
Theoretical models for the thermal response of vertical geothermal boreholes often assume that the characteristic time of variation of the heat injection rate is much larger than the characteristic diffusion time across the borehole. In this case, heat transfer inside the borehole and in its immediate surroundings is quasi-steady in the first approximation, while unsteady effects enter only in the far field. Previous studies have exploited this disparity of time scales, incorporating approximate matching conditions to couple the near-borehole region with the outer unsteady temperatura field. In the present work matched asymptotic expansion techniques are used to analyze the heat transfer problem, delivering a rigorous derivation of the true matching condition between the two regions and of the correct definition of the network of thermal resistances that represents the quasi-steady solution near the borehole. Additionally, an apparent temperature due to the unsteady far field is identified that needs to be taken into account by the near-borehole region for the correct computation of the heat injection rate. This temperature differs from the usual mean borehole temperature employed in the literatura.
Resumo:
In this paper, an analytical solution of the main problem, a satellite only perturbed by the J2 harmonic, is derived with the aid of perturbation theory and by using DROMO variables. The solution, which is valid for circular and elliptic orbits with generic eccentricity and inclination, describes the instantaneous time variation of all orbital elements, that is, the actual values of the osculating elements
Resumo:
In this article, an approximate analytical solution for the two body problem perturbed by a radial, low acceleration is obtained, using a regularized formulation of the orbital motion and the method of multiple scales. The results reveal that the physics of the problem evolve in two fundamental scales of the true anomaly. The first one drives the oscillations of the orbital parameters along each orbit. The second one is responsible of the long-term variations in the amplitude and mean values of these oscillations. A good agreement is found with high precision numerical solutions.
Resumo:
Abstract We consider a wide class of models that includes the highly reliable Markovian systems (HRMS) often used to represent the evolution of multi-component systems in reliability settings. Repair times and component lifetimes are random variables that follow a general distribution, and the repair service adopts a priority repair rule based on system failure risk. Since crude simulation has proved to be inefficient for highly-dependable systems, the RESTART method is used for the estimation of steady-state unavailability and other reliability measures. In this method, a number of simulation retrials are performed when the process enters regions of the state space where the chance of occurrence of a rare event (e.g., a system failure) is higher. The main difficulty involved in applying this method is finding a suitable function, called the importance function, to define the regions. In this paper we introduce an importance function which, for unbalanced systems, represents a great improvement over the importance function used in previous papers. We also demonstrate the asymptotic optimality of RESTART estimators in these models. Several examples are presented to show the effectiveness of the new approach, and probabilities up to the order of 10-42 are accurately estimated with little computational effort.
Resumo:
The effect of small mistuning in the forced response of a bladed disk is analyzed using a recently introduced methodology: the asymptotic mistuning model. The asymptotic mistuning model is an extremely reduced, simplified model that is derived directly from the full formulation of the mistuned bladed disk using a consistent perturbative procedure based on the relative smallness of the mistuning distortion. A detailed description of the derivation of the asymptotic mistuning model for a realistic bladed disk configuration is presented. The asymptotic mistuning model results for several different mistuning patterns and forcing conditions are compared with those from a high-resolution finite element model. The asymptotic mistuning model produces quantitatively accurate results, and, probably more relevant, it gives precise information about the factors (tuned modes and components of the mistuning pattern) that actually play a role in the vibrational forced response of mistuned bladed disks.
Resumo:
Es bien conocido que las pequeñas imperfecciones existentes en los álabes de un rótor de turbomaquinaria (conocidas como “mistuning”) pueden causar un aumento considerable de la amplitud de vibración de la respuesta forzada y, por el contrario, tienen típicamente un efecto beneficioso en el flameo del rótor. Para entender estos efectos se pueden llevar a cabo estudios numéricos del problema aeroelástico completo. Sin embargo, el cálculo de “mistuning” usando modelos de alta resolución es una tarea difícil de realizar, ya que los modelos necesarios para describir de manera precisa el componente de turbomáquina (por ejemplo rotor) tienen, necesariamente, un número muy elevado de grados de libertad, y, además, es necesario hacer un estudio estadístico para poder explorar apropiadamente las distribuciones posibles de “mistuning”, que tienen una naturaleza aleatoria. Diferentes modelos de orden reducido han sido desarrollados en los últimos años para superar este inconveniente. Uno de estos modelos, llamado “Asymptotic Mistuning Model (AMM)”, se deriva de la formulación completa usando técnicas de perturbaciones que se basan en que el “mistuning” es pequeño. El AMM retiene sólo los modos relevantes para describir el efecto del mistuning, y permite identificar los mecanismos clave involucrados en la amplificación de la respuesta forzada y en la estabilización del flameo. En este trabajo, el AMM se usa para estudiar el efecto del “mistuning” de la estructura y de la amortiguación sobre la amplitud de la respuesta forzada. Los resultados obtenidos son validados usando modelos simplificados del rotor y también otros de alta definición. Además, en el marco del proyecto europeo FP7 "Flutter-Free Turbomachinery Blades (FUTURE)", el AMM se aplica para diseñar distribuciones de “mistuning” intencional: (i) una que anula y (ii) otra que reduce a la mitad la amplitud del flameo de un rotor inestable; y las distribuciones obtenidas se validan experimentalmente. Por último, la capacidad de AMM para predecir el comportamiento de flameo de rotores con “mistuning” se comprueba usando resultados de CFD detallados. Abstract It is well known that the small imperfections of the individual blades in a turbomachinery rotor (known as “mistuning”) can cause a substantial increase of the forced response vibration amplitude, and it also typically results in an improvement of the flutter vibration characteristics of the rotor. The understanding of these phenomena can be attempted just by performing numerical simulations of the complete aeroelastic problem. However, the computation of mistuning cases using high fidelity models is a formidable task, because a detailed model of the whole rotor has to be considered, and a statistical study has to be carried out in order to properly explore the effect of the random mistuning distributions. Many reduced order models have been developed in recent years to overcome this barrier. One of these models, called the Asymptotic Mistuning Model (AMM), is systematically derived from the complete bladed disk formulation using a consistent perturbative procedure that exploits the smallness of mistuning to simplify the problem. The AMM retains only the essential system modes that are involved in the mistuning effect, and it allows to identify the key mechanisms of the amplification of the forced response amplitude and the flutter stabilization. In this work, AMM methodolgy is used to study the effect of structural and damping mistuning on the forced response vibration amplitude. The obtained results are verified using a one degree of freedom model of a rotor, and also high fidelity models of the complete rotor. The AMM is also applied, in the frame of the European FP7 project “Flutter-Free Turbomachinery Blades (FUTURE)”, to design two intentional mistuning patterns: (i) one to complete stabilize an unstable rotor, and (ii) other to approximately reduce by half its flutter amplitude. The designed patterns are validated experimentally. Finally, the ability of AMM to predict the flutter behavior of mistuned rotors is checked against numerical, high fidelity CFD results.
Resumo:
El extraordinario auge de las nuevas tecnologías de la información, el desarrollo de la Internet de las Cosas, el comercio electrónico, las redes sociales, la telefonía móvil y la computación y almacenamiento en la nube, han proporcionado grandes beneficios en todos los ámbitos de la sociedad. Junto a éstos, se presentan nuevos retos para la protección y privacidad de la información y su contenido, como la suplantación de personalidad y la pérdida de la confidencialidad e integridad de los documentos o las comunicaciones electrónicas. Este hecho puede verse agravado por la falta de una frontera clara que delimite el mundo personal del mundo laboral en cuanto al acceso de la información. En todos estos campos de la actividad personal y laboral, la Criptografía ha jugado un papel fundamental aportando las herramientas necesarias para garantizar la confidencialidad, integridad y disponibilidad tanto de la privacidad de los datos personales como de la información. Por otro lado, la Biometría ha propuesto y ofrecido diferentes técnicas con el fin de garantizar la autentificación de individuos a través del uso de determinadas características personales como las huellas dáctilares, el iris, la geometría de la mano, la voz, la forma de caminar, etc. Cada una de estas dos ciencias, Criptografía y Biometría, aportan soluciones a campos específicos de la protección de datos y autentificación de usuarios, que se verían enormemente potenciados si determinadas características de ambas ciencias se unieran con vistas a objetivos comunes. Por ello es imperativo intensificar la investigación en estos ámbitos combinando los algoritmos y primitivas matemáticas de la Criptografía con la Biometría para dar respuesta a la demanda creciente de nuevas soluciones más técnicas, seguras y fáciles de usar que potencien de modo simultáneo la protección de datos y la identificacíón de usuarios. En esta combinación el concepto de biometría cancelable ha supuesto una piedra angular en el proceso de autentificación e identificación de usuarios al proporcionar propiedades de revocación y cancelación a los ragos biométricos. La contribución de esta tesis se basa en el principal aspecto de la Biometría, es decir, la autentificación segura y eficiente de usuarios a través de sus rasgos biométricos, utilizando tres aproximaciones distintas: 1. Diseño de un esquema criptobiométrico borroso que implemente los principios de la biometría cancelable para identificar usuarios lidiando con los problemas acaecidos de la variabilidad intra e inter-usuarios. 2. Diseño de una nueva función hash que preserva la similitud (SPHF por sus siglas en inglés). Actualmente estas funciones se usan en el campo del análisis forense digital con el objetivo de buscar similitudes en el contenido de archivos distintos pero similares de modo que se pueda precisar hasta qué punto estos archivos pudieran ser considerados iguales. La función definida en este trabajo de investigación, además de mejorar los resultados de las principales funciones desarrolladas hasta el momento, intenta extender su uso a la comparación entre patrones de iris. 3. Desarrollando un nuevo mecanismo de comparación de patrones de iris que considera tales patrones como si fueran señales para compararlos posteriormente utilizando la transformada de Walsh-Hadarmard. Los resultados obtenidos son excelentes teniendo en cuenta los requerimientos de seguridad y privacidad mencionados anteriormente. Cada uno de los tres esquemas diseñados han sido implementados para poder realizar experimentos y probar su eficacia operativa en escenarios que simulan situaciones reales: El esquema criptobiométrico borroso y la función SPHF han sido implementados en lenguaje Java mientras que el proceso basado en la transformada de Walsh-Hadamard en Matlab. En los experimentos se ha utilizado una base de datos de imágenes de iris (CASIA) para simular una población de usuarios del sistema. En el caso particular de la función de SPHF, además se han realizado experimentos para comprobar su utilidad en el campo de análisis forense comparando archivos e imágenes con contenido similar y distinto. En este sentido, para cada uno de los esquemas se han calculado los ratios de falso negativo y falso positivo. ABSTRACT The extraordinary increase of new information technologies, the development of Internet of Things, the electronic commerce, the social networks, mobile or smart telephony and cloud computing and storage, have provided great benefits in all areas of society. Besides this fact, there are new challenges for the protection and privacy of information and its content, such as the loss of confidentiality and integrity of electronic documents and communications. This is exarcebated by the lack of a clear boundary between the personal world and the business world as their differences are becoming narrower. In both worlds, i.e the personal and the business one, Cryptography has played a key role by providing the necessary tools to ensure the confidentiality, integrity and availability both of the privacy of the personal data and information. On the other hand, Biometrics has offered and proposed different techniques with the aim to assure the authentication of individuals through their biometric traits, such as fingerprints, iris, hand geometry, voice, gait, etc. Each of these sciences, Cryptography and Biometrics, provides tools to specific problems of the data protection and user authentication, which would be widely strengthen if determined characteristics of both sciences would be combined in order to achieve common objectives. Therefore, it is imperative to intensify the research in this area by combining the basics mathematical algorithms and primitives of Cryptography with Biometrics to meet the growing demand for more secure and usability techniques which would improve the data protection and the user authentication. In this combination, the use of cancelable biometrics makes a cornerstone in the user authentication and identification process since it provides revocable or cancelation properties to the biometric traits. The contributions in this thesis involve the main aspect of Biometrics, i.e. the secure and efficient authentication of users through their biometric templates, considered from three different approaches. The first one is designing a fuzzy crypto-biometric scheme using the cancelable biometric principles to take advantage of the fuzziness of the biometric templates at the same time that it deals with the intra- and inter-user variability among users without compromising the biometric templates extracted from the legitimate users. The second one is designing a new Similarity Preserving Hash Function (SPHF), currently widely used in the Digital Forensics field to find similarities among different files to calculate their similarity level. The function designed in this research work, besides the fact of improving the results of the two main functions of this field currently in place, it tries to expand its use to the iris template comparison. Finally, the last approach of this thesis is developing a new mechanism of handling the iris templates, considering them as signals, to use the Walsh-Hadamard transform (complemented with three other algorithms) to compare them. The results obtained are excellent taking into account the security and privacy requirements mentioned previously. Every one of the three schemes designed have been implemented to test their operational efficacy in situations that simulate real scenarios: The fuzzy crypto-biometric scheme and the SPHF have been implemented in Java language, while the process based on the Walsh-Hadamard transform in Matlab. The experiments have been performed using a database of iris templates (CASIA-IrisV2) to simulate a user population. The case of the new SPHF designed is special since previous to be applied i to the Biometrics field, it has been also tested to determine its applicability in the Digital Forensic field comparing similar and dissimilar files and images. The ratios of efficiency and effectiveness regarding user authentication, i.e. False Non Match and False Match Rate, for the schemes designed have been calculated with different parameters and cases to analyse their behaviour.