31 resultados para Fundamentals guarantees

em Chinese Academy of Sciences Institutional Repositories Grid Portal


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This book elucidates the methods of molecular gas dynamics or rarefied gas dynamics which treat the problems of gas flows when the discrete molecular effects of the gas prevail under the circumstances of low density, the emphases being stressed on the basis of the methods, the direct simulation Monte Carlo method applied to the simulation of non-equilibrium effects and the frontier subjects related to low speed microscale rarefied gas flows. It provides a solid basis for the study of molecular gas dynamics for senior students and graduates in the aerospace and mechanical engineering departments of universities and colleges. It gives a general acquaintance of modern developments of rarefied gas dynamics in various regimes and leads to the frontier topics of non-equilibrium rarefied gas dynamics and low speed microscale gas dynamics. It will be also of benefit to the scientific and technical researchers engaged in aerospace high altitude aerodynamic force and heating design and in the research on gas flow in MEMS

  • 目次内容                                                                
[1]  Molecular structure and energy states (21)  
 
[2]  Some basic concepts of kinetic theory (51)  
 
[3]  Interaction of molecules with solid surface (131)  
 
[4]  Free molecular flow (159)  
 
[5]  Continuum models (191)  
 
[6]  Transitional regime (231)  
 
[7]  Direct simulation Monte-Carlo (DSMC) method (275)  
 
[8]  Microscale slow gas flows, information preservation method (317)  
 
[App. I]  Gas properties (367)  
 
[App. II]  Some integrals (369)  
 
[App. III]  Sampling from a prescribed distribution (375)  
 
[App. IV]  Program of the couette flow (383)  
 
Subject Index (399)  

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A new phenomenological deformation theory with strain gradient effects is proposed. This theory, which belongs to nonlinear elasticity, fits within the framework of general couple stress theory and involves a single material length scale l. In the present theory three rotational degrees of freedom omega(i) are introduced in addition to the conventional three translational degrees of freedom u(i). omega(i) has no direct dependence upon ui and is called the micro-rotation, i.e. the material rotation theta(i) plus the particle relative rotation. The strain energy density is assumed to only be a function of the strain tensor and the overall curvature tensor, which results in symmetric Cauchy stresses. Minimum potential principle is developed for the strain gradient deformation theory version. In the limit of vanishing 1, it reduces to the conventional counterparts: J(2) deformation theory. Equilibrium equations, constitutive relations and boundary conditions are given in details. Comparisons between the present theory and the theory proposed by Shizawa and Zbib (Shizawa, K., Zbib, H.M., 1999. A thermodynamical theory gradient elastoplasticity with dislocation density Censor: fundamentals. Int. J. Plast. 15, 899) are given. With the same hardening law as Fleck et al. (Fleck, N.A., Muller, G.H., Ashby, M.F., Hutchinson, JW., 1994 Strain gradient plasticity: theory and experiment. Acta Metall. Mater 42, 475), the new strain gradient deformation theory is used to investigate two typical examples, i.e. thin metallic wire torsion and ultra-thin metallic beam bend. The results are compared with those given by Fleck et al, 1994 and Stolken and Evans (Stolken, J.S., Evans, A.G., 1998. A microbend test method for measuring the plasticity length scale. Acta Mater. 46, 5109). In addition, it is explained for a unit cell that the overall curvature tensor produced by the overall rotation vector is the work conjugate of the overall couple stress tensor. (C) 2002 Elsevier Science Ltd. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The expansion property of cement mortar under the attack of sulfate ions is studied by experimental and theoretical methods. First, cement mortars are fabricated with the ratio of water to cement of 0.4, 0.6, and 0.8. Secondly, the expansion of specimen immerged in sulphate solution is measured at different times. Thirdly, a theoretical model of expansion of cement mortar under sulphate erosion is suggested by virtue of represent volume element method. In this model, the damage evolution due to the interaction between delayed ettringite and cement mortar is taken into account. Finally, the numerical calculation is performed. The numerical and experimental results indicate that the model perfectly describes the expansion of the cement mortar.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Under the environment of seawater, durability of concrete materials is one of the chief factors considered in the design of structures. The decrease of durability of structures is induced by the evolution of micro-damage due to the erosion of chlorine and sulfate ions, which is characterized by the reduction of modulus, strength, and toughness of the material. In this paper, the variation of the flexural strength of cement mortar under sulfate erosion is investigated. The results obtained in present work indicate that the erosion time, concentration of sulfate solution, and water-to-cement ratio will significantly affect the flexural strength. Crown Copyright (c) 2008 Published by Elsevier Ltd. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A set of new formula of energy functions for ferroelectrics was proposed, and then the new basic equations were derived in this paper. The finite element formulation based on the new basic equations was improved to avoid the equivalent nodal load produced by remnant polarization. With regard to the fundamentals of mathematics and physics, the new energy functions and basic equations are reasonable for the material element of ferroelectrics in finite element analysis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A new high-order finite volume method based on local reconstruction is presented in this paper. The method, so-called the multi-moment constrained finite volume (MCV) method, uses the point values defined within single cell at equally spaced points as the model variables (or unknowns). The time evolution equations used to update the unknowns are derived from a set of constraint conditions imposed on multi kinds of moments, i.e. the cell-averaged value and the point-wise value of the state variable and its derivatives. The finite volume constraint on the cell-average guarantees the numerical conservativeness of the method. Most constraint conditions are imposed on the cell boundaries, where the numerical flux and its derivatives are solved as general Riemann problems. A multi-moment constrained Lagrange interpolation reconstruction for the demanded order of accuracy is constructed over single cell and converts the evolution equations of the moments to those of the unknowns. The presented method provides a general framework to construct efficient schemes of high orders. The basic formulations for hyperbolic conservation laws in 1- and 2D structured grids are detailed with the numerical results of widely used benchmark tests. (C) 2009 Elsevier Inc. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In practical situations, the causes of image blurring are often undiscovered or difficult to get known. However, traditional methods usually assume the knowledge of the blur has been known prior to the restoring process, which are not practicable for blind image restoration. A new method proposed in this paper aims exactly at blind image restoration. The restoration process is transformed into a problem of point distribution analysis in high-dimensional space. Experiments have proved that the restoration could be achieved using this method without re-knowledge of the image blur. In addition, the algorithm guarantees to be convergent and has simple computation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For a class of nonlinear dynamical systems, the adaptive controllers are investigated using direction basis function (DBF) in this paper. Based on the criterion of Lyapunov' stability, DBF is designed which guarantees that the output of the controlled system asymptotically tracks the reference signals. Finally, the simulation shows the good tracking effectiveness of the adaptive controller.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A nonequilibrium Green's-function formalism is employed to study the time-dependent transport through resonant-tunneling structures. With this formalism, we derive a time-dependent Landauer-Buttiker formula that guarantees current conservation and gauge invariance. Furthermore, we apply the formula to calculate the response behaviors of the resonant-tunneling structures in the presence of rectangular-pulse and harmonic-modulation fields. The results show that the displacement current plays the role of retarding the tunneling current.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

High-frequency vibrational modes have been observed at liquid-helium temperature in silicon samples grown in a H-2 or D-2 atmosphere. The highest-frequency ones are due to the overtones and combination modes of SiH fundamentals. Others are CH modes due to (C,H) complexes, but the simultaneous presence of NH modes due to (N,H) complexes cannot be excluded. The present results seem to show also the existence of centers including both SiH and CH or NH bonds. One sharp mode at 4349 cm-l is related to a weak SiH fundamental at 2210 cm(-1). The related center is ascribed to a vacancy fully decorated with hydrogen with a nearest-neighbor C atom. [S0163-1829(99)00911-X].

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Interpolation attack was presented by Jakobsen and Knudsen at FSE'97. Interpolation attack is effective against ciphers that have a certain algebraic structure like the PURE cipher which is a prototype cipher, but it is difficult to apply the attack to real-world ciphers. This difficulty is due to the difficulty of deriving a low degree polynomial relation between ciphertexts and plaintexts. In other words, it is difficult to evaluate the security against interpolation attack. This paper generalizes the interpolation attack. The generalization makes easier to evaluate the security against interpolation attack. We call the generalized interpolation attack linear sum attack. We present an algorithm that evaluates the security of byte-oriented ciphers against linear sum attack. Moreover, we show the relationship between linear sum attack and higher order differential attack. In addition, we show the security of CRYPTON, E2, and RIJNDAEL against linear sum attack using the algorithm.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We focus on the relationship between the linearization method and linear complexity and show that the linearization method is another effective technique for calculating linear complexity. We analyze its effectiveness by comparing with the logic circuit method. We compare the relevant conditions and necessary computational cost with those of the Berlekamp-Massey algorithm and the Games-Chan algorithm. The significant property of a linearization method is that it needs no output sequence from a pseudo-random number generator (PRNG) because it calculates linear complexity using the algebraic expression of its algorithm. When a PRNG has n [bit] stages (registers or internal states), the necessary computational cost is smaller than O(2n). On the other hand, the Berlekamp-Massey algorithm needs O(N2) where N ( 2n) denotes period. Since existing methods calculate using the output sequence, an initial value of PRNG influences a resultant value of linear complexity. Therefore, a linear complexity is generally given as an estimate value. On the other hand, a linearization method calculates from an algorithm of PRNG, it can determine the lower bound of linear complexity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This is a study on a certain group theoretic property of the set of encryption functions of a block cipher. We have shown how to construct a subset which has this property in a given symmetric group by a computer algebra software GAP4.2 (Groups, Algorithms, and Programming, Version 4.2). These observations on group structures of block ciphers suggest us that we may be able to set a trapdoor based on meet-in-the-middle attack on block ciphers.

Relevância:

10.00% 10.00%

Publicador: