8 resultados para Nonlocal Boundary Value Problem


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dissertação para obtenção do Grau de Doutor em Matemática

Relevância:

100.00% 100.00%

Publicador:

Resumo:

5th Portuguese Conference on Automatic Control, September, 5-7, 2002, Aveiro, Portugal

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dissertação apresentada para obtenção do grau de Doutor em Matemática na especialidade de Equações Diferenciais, pela Universidade Nova de Lisboa,Faculdade de Ciências e Tecnologia

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Undesirable void formation during the injection phase of the liquid composite molding process can be understood as a consequence of the non-uniformity of the flow front progression, caused by the dual porosity of the fiber perform. Therefore the best examination of the void formation physics can be provided by a mesolevel analysis, where the characteristic dimension is given by the fiber tow diameter. In mesolevel analysis, liquid impregnation along two different scales; inside fiber tows and within the spaces between them; must be considered and the coupling between these flow regimes must be addressed. In such case, it is extremely important to account correctly for the surface tension effects, which can be modeled as capillary pressure applied at the flow front. When continues Galerkin method is used, exploiting elements with velocity components and pressure as nodal variables, strong numerical implementation of such boundary conditions leads to ill-posing of the problem, in terms of the weak classical as well as stabilized formulation. As a consequence, there is an error in mass conservation accumulated especially along the free flow front. This article presents a numerical procedure, which was formulated and implemented in the existing Free Boundary Program in order to significantly reduce this error.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Undesirable void formation during the injection phase of the liquid composite moulding process can be understood as a consequence of the non-uniformity of the flow front progression, caused by the dual porosity of the fibre perform. Therefore the best examination of the void formation physics can be provided by a mesolevel analysis, where the characteristic dimension is given by the fibre tow diameter. In mesolevel analysis, liquid impregnation along two different scales; inside fibre tows and within the open spaces between them; must be considered and the coupling between these flow regimes must be addressed. In such case, it is extremely important to account correctly for the surface tension effects, which can be modelled as capillary pressure applied at the flow front. Numerical implementation of such boundary conditions leads to ill-posing of the problem, in terms of the weak classical as well as stabilized formulation. As a consequence, there is an error in mass conservation accumulated especially along the free flow front. This contribution presents a numerical procedure, which was formulated and implemented in the existing Free Boundary Program in order to significantly reduce this error.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A Work Project, presented as part of the requirements for the Award of a Masters Degree in Finance from the NOVA – School of Business and Economics

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A Work Project, presented as part of the requirements for the Award of a Masters Degree in Management from the NOVA – School of Business and Economics

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Information systems are widespread and used by anyone with computing devices as well as corporations and governments. It is often the case that security leaks are introduced during the development of an application. Reasons for these security bugs are multiple but among them one can easily identify that it is very hard to define and enforce relevant security policies in modern software. This is because modern applications often rely on container sharing and multi-tenancy where, for instance, data can be stored in the same physical space but is logically mapped into different security compartments or data structures. In turn, these security compartments, to which data is classified into in security policies, can also be dynamic and depend on runtime data. In this thesis we introduce and develop the novel notion of dependent information flow types, and focus on the problem of ensuring data confidentiality in data-centric software. Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural data type itself, to depend on runtime values. Our dependent function and dependent sum information flow types provide a direct, natural and elegant way to express and enforce fine grained security policies on programs. Namely programs that manipulate structured data types in which the security level of a structure field may depend on values dynamically stored in other fields The main contribution of this work is an efficient analysis that allows programmers to verify, during the development phase, whether programs have information leaks, that is, it verifies whether programs protect the confidentiality of the information they manipulate. As such, we also implemented a prototype typechecker that can be found at http://ctp.di.fct.unl.pt/DIFTprototype/.