27 resultados para algebraic laws

em Chinese Academy of Sciences Institutional Repositories Grid Portal


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A finite compact (FC) difference scheme requiring only bi-diagonal matrix inversion is proposed by using the known high-resolution flux. Introducing TVD or ENO limiters in the numerical flux, several high-resolution FC-schemes of hyperbolic conservation law are developed, including the FC-TVD, third-order FC-ENO and fifth-order FC-ENO schemes. Boundary conditions formulated need only one unknown variable for third-order FC-ENO scheme and two unknown variables for fifth-order FC-ENO scheme. Numerical test results of the proposed FC-scheme were compared with traditional TVD, ENO and WENO schemes to demonstrate its high-order accuracy and high-resolution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

给出相对论力学中普遍定律的实用判别法和协变集的实用构造法,还给出实现非普遍定律的“可导出性”的一种实用方法.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is shown in this paper that the laws of cratering in a thick target under hypervelocity impact by a spherical projectile can be approximately expressed by the so-called iso-deviation law and a 2/3 power law. Moreover, hypervelocity impact should be characterized by the isotropic expansion of a crater. In the special case, when the projectile and target are of the same material, the laws mentioned above reduce to the result of a semi-spherical crater and the energy criterion. Generally speaking, a semi-spherical crater and the energy criterion are both approximations, which only take projectile density and target strength into account, and can be used for a rough estimation on the order of magnitude. The inconsistency in various fitted power laws in the literature was also clarified and explained in the paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the case of suspension flows, the rate of interphase momentum transfer M(k) and that of interphase energy transfer E(k), which were expressed as a sum of infinite discontinuities by Ishii, have been reduced to the sum of several terms which have concise physical significance. M(k) is composed of the following terms: (i) the momentum carried by the interphase mass transfer; (ii) the interphase drag force due to the relative motion between phases; (iii) the interphase force produced by the concentration gradient of the dispersed phase in a pressure field. And E(k) is composed of the following four terms, that is, the energy carried by the interphase mass transfer, the work produced by the interphase forces of the second and third parts above, and the heat transfer between phases. It is concluded from the results that (i) the term, (-alpha-k-nabla-p), which is related to the pressure gradient in the momentum equation, can be derived from the basic conservation laws without introducing the "shared-pressure presumption"; (ii) the mean velocity of the action point of the interphase drag is the mean velocity of the interface displacement, upsilonBAR-i. It is approximately equal to the mean velocity of the dispersed phase, upsilonBAR-d. Hence the work terms produced by the drag forces are f(dc) . upsilonBAR-d, and f(cd) . upsilonBAR-d, respectively, with upsilonBAR-i not being replaced by the mean velocity of the continuous phase, upsilonBAR-c; (iii) by analogy, the terms of the momentum transfer due to phase change are upsilonBAR-d-GAMMA-c, and upsilonBAR-d-GAMMA-d, respectively; (iv) since the transformation between explicit heat and latent heat occurs in the process of phase change, the algebraic sum of the heat transfer between phases is not equal to zero. Q(ic) and Q(id) are composed of the explicit heat and latent heat, so that the sum Q(ic) + Q(id)) is equal to zero.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is a study on a certain group theoretic property of the set of encryption functions of a block cipher. We have shown how to construct a subset which has this property in a given symmetric group by a computer algebra software GAP4.2 (Groups, Algorithms, and Programming, Version 4.2). These observations on group structures of block ciphers suggest us that we may be able to set a trapdoor based on meet-in-the-middle attack on block ciphers.