899 resultados para Boundary preserving
Resumo:
Some dynamical properties present in a problem concerning the acceleration of particles in a wave packet are studied. The dynamics of the model is described in terms of a two-dimensional area preserving map. We show that the phase space is mixed in the sense that there are regular and chaotic regions coexisting. We use a connection with the standard map in order to find the position of the first invariant spanning curve which borders the chaotic sea. We find that the position of the first invariant spanning curve increases as a power of the control parameter with the exponent 2/3. The standard deviation of the kinetic energy of an ensemble of initial conditions obeys a power law as a function of time, and saturates after some crossover. Scaling formalism is used in order to characterise the chaotic region close to the transition from integrability to nonintegrability and a relationship between the power law exponents is derived. The formalism can be applied in many different systems with mixed phase space. Then, dissipation is introduced into the model and therefore the property of area preservation is broken, and consequently attractors are observed. We show that after a small change of the dissipation, the chaotic attractor as well as its basin of attraction are destroyed, thus leading the system to experience a boundary crisis. The transient after the crisis follows a power law with exponent -2. (C) 2011 Elsevier Ltd. All rights reserved.
Resumo:
The Al Shomou Silicilyte Member (Athel Formation) in the South Oman Salt Basin shares many of the characteristics of a light, tight-oil (LTO) reservoir: it is a prolifi c source rock mature for light oil, it produces light oil from a very tight matrix and reservoir, and hydraulic fracking technology is required to produce the oil. What is intriguing about the Al Shomou Silicilyte, and different from other LTO reservoirs, is its position related to the Precambrian/Cambrian Boundary (PCB) and the fact that it is a ‘laminated chert‘ rather than a shale. In an integrated diagenetic study we applied microstructural analyses (SEM, BSE) combined with state-of-the-art stable isotope and trace element analysis of the silicilyte matrix and fractures. Fluid inclusion microthermometry was applied to record the salinity and minimum trapping temperatures. The microstructural investigations reveal a fi ne lamination of the silicilyte matrix with a mean lamina thickness of ca. 20 μm consisting of predominantly organic matter-rich and fi nely crystalline quartz-rich layers, respectively. Authigenic, micron-sized idiomorphic quartz crystals are the main matrix components of the silicilyte. Other diagenetic phases are pyrite, apatite, dolomite, magnesite and barite cements. Porosity values based on neutron density logs and core plug data indicate porosity in the silicilyte ranges from less than 2% to almost to 40%. The majority of the pore space in the silicilyte is related to (primary) inter-crystalline pores, with locally important oversized secondary pores. Pore casts of the silica matrix show that pores are extremely irregular in three dimensions, and are generally interconnected by a complex web or meshwork of fi ne elongate pore throats. Mercury injection capillary data are in line with the microstructural observations suggesting two populations of pore throats, with an effective average modal diameter of 0.4 μm. The acquired geochemical data support the interpretation that the primary source of the silica is the ambient seawater rather than hydrothermal or biogenic. A maximum temperature of ca. 45°C for the formation of microcrystalline quartz in the silicilyte is good evidence that the lithifi cation and crystallization of quartz occurred in the fi rst 5 Ma after deposition. Several phases of brittle fracturing and mineralization occurred in response to salt tectonics during burial. The sequences of fracture-fi lling mineral phases (dolomite - layered chalcedony – quartz – apatite - magnesite I+II - barite – halite) indicates a complex fl uid evolution after silicilyte lithifi cation. Primary, all-liquid fl uid inclusions in the fracturefi lling quartz are good evidence of growth beginning at low temperatures, i.e. ≤ 50ºC. Continuous precipitation during increasing temperature and burial is documented by primary two-phase fl uid inclusions in quartz cements that show brines at 50°C and fi rst hydrocarbons at ca. 70°C. The absolute timing of each mineral phase can be constrained based on U-Pb geochronometry, and basin modelling. Secondary fl uid inclusions in quartz, magnesite and barite indicate reactivation of the fracture system after peak burial temperature during the major cooling event, i.e. uplift, between 450 and 310 Ma. A number of fi rst-order trends in porosity and reservoir-quality distribution are observed which are strongly related to the diagenetic and fl uid history of the reservoir: the early in-situ generation of hydrocarbons and overpressure development arrests diagenesis and preserves matrix porosity. Chemical compaction by pressure dissolution in the fl ank areas could be a valid hypothesis to explain the porosity variations in the silicilitye slabs resulting in lower porosity and poorer connectivity on the fl anks of the reservoir. Most of the hydrocarbon storage and production comes from intervals characterized by Amthor et al. 114488 preserved micropores, not hydrocarbon storage in a fracture system. The absence of oil expulsion results in present-day high oil saturations. The main diagenetic modifi cations of the silicilyte occurred and were completed relatively early in its history, i.e. before 300 Ma. An instrumental factor for preserving matrix porosity is the diffi culty for a given slab to evacuate all the fl uids (water and hydrocarbons), or in other words, the very good sealing capacity of the salt embedding the slab.
Resumo:
El extraordinario auge de las nuevas tecnologías de la información, el desarrollo de la Internet de las Cosas, el comercio electrónico, las redes sociales, la telefonía móvil y la computación y almacenamiento en la nube, han proporcionado grandes beneficios en todos los ámbitos de la sociedad. Junto a éstos, se presentan nuevos retos para la protección y privacidad de la información y su contenido, como la suplantación de personalidad y la pérdida de la confidencialidad e integridad de los documentos o las comunicaciones electrónicas. Este hecho puede verse agravado por la falta de una frontera clara que delimite el mundo personal del mundo laboral en cuanto al acceso de la información. En todos estos campos de la actividad personal y laboral, la Criptografía ha jugado un papel fundamental aportando las herramientas necesarias para garantizar la confidencialidad, integridad y disponibilidad tanto de la privacidad de los datos personales como de la información. Por otro lado, la Biometría ha propuesto y ofrecido diferentes técnicas con el fin de garantizar la autentificación de individuos a través del uso de determinadas características personales como las huellas dáctilares, el iris, la geometría de la mano, la voz, la forma de caminar, etc. Cada una de estas dos ciencias, Criptografía y Biometría, aportan soluciones a campos específicos de la protección de datos y autentificación de usuarios, que se verían enormemente potenciados si determinadas características de ambas ciencias se unieran con vistas a objetivos comunes. Por ello es imperativo intensificar la investigación en estos ámbitos combinando los algoritmos y primitivas matemáticas de la Criptografía con la Biometría para dar respuesta a la demanda creciente de nuevas soluciones más técnicas, seguras y fáciles de usar que potencien de modo simultáneo la protección de datos y la identificacíón de usuarios. En esta combinación el concepto de biometría cancelable ha supuesto una piedra angular en el proceso de autentificación e identificación de usuarios al proporcionar propiedades de revocación y cancelación a los ragos biométricos. La contribución de esta tesis se basa en el principal aspecto de la Biometría, es decir, la autentificación segura y eficiente de usuarios a través de sus rasgos biométricos, utilizando tres aproximaciones distintas: 1. Diseño de un esquema criptobiométrico borroso que implemente los principios de la biometría cancelable para identificar usuarios lidiando con los problemas acaecidos de la variabilidad intra e inter-usuarios. 2. Diseño de una nueva función hash que preserva la similitud (SPHF por sus siglas en inglés). Actualmente estas funciones se usan en el campo del análisis forense digital con el objetivo de buscar similitudes en el contenido de archivos distintos pero similares de modo que se pueda precisar hasta qué punto estos archivos pudieran ser considerados iguales. La función definida en este trabajo de investigación, además de mejorar los resultados de las principales funciones desarrolladas hasta el momento, intenta extender su uso a la comparación entre patrones de iris. 3. Desarrollando un nuevo mecanismo de comparación de patrones de iris que considera tales patrones como si fueran señales para compararlos posteriormente utilizando la transformada de Walsh-Hadarmard. Los resultados obtenidos son excelentes teniendo en cuenta los requerimientos de seguridad y privacidad mencionados anteriormente. Cada uno de los tres esquemas diseñados han sido implementados para poder realizar experimentos y probar su eficacia operativa en escenarios que simulan situaciones reales: El esquema criptobiométrico borroso y la función SPHF han sido implementados en lenguaje Java mientras que el proceso basado en la transformada de Walsh-Hadamard en Matlab. En los experimentos se ha utilizado una base de datos de imágenes de iris (CASIA) para simular una población de usuarios del sistema. En el caso particular de la función de SPHF, además se han realizado experimentos para comprobar su utilidad en el campo de análisis forense comparando archivos e imágenes con contenido similar y distinto. En este sentido, para cada uno de los esquemas se han calculado los ratios de falso negativo y falso positivo. ABSTRACT The extraordinary increase of new information technologies, the development of Internet of Things, the electronic commerce, the social networks, mobile or smart telephony and cloud computing and storage, have provided great benefits in all areas of society. Besides this fact, there are new challenges for the protection and privacy of information and its content, such as the loss of confidentiality and integrity of electronic documents and communications. This is exarcebated by the lack of a clear boundary between the personal world and the business world as their differences are becoming narrower. In both worlds, i.e the personal and the business one, Cryptography has played a key role by providing the necessary tools to ensure the confidentiality, integrity and availability both of the privacy of the personal data and information. On the other hand, Biometrics has offered and proposed different techniques with the aim to assure the authentication of individuals through their biometric traits, such as fingerprints, iris, hand geometry, voice, gait, etc. Each of these sciences, Cryptography and Biometrics, provides tools to specific problems of the data protection and user authentication, which would be widely strengthen if determined characteristics of both sciences would be combined in order to achieve common objectives. Therefore, it is imperative to intensify the research in this area by combining the basics mathematical algorithms and primitives of Cryptography with Biometrics to meet the growing demand for more secure and usability techniques which would improve the data protection and the user authentication. In this combination, the use of cancelable biometrics makes a cornerstone in the user authentication and identification process since it provides revocable or cancelation properties to the biometric traits. The contributions in this thesis involve the main aspect of Biometrics, i.e. the secure and efficient authentication of users through their biometric templates, considered from three different approaches. The first one is designing a fuzzy crypto-biometric scheme using the cancelable biometric principles to take advantage of the fuzziness of the biometric templates at the same time that it deals with the intra- and inter-user variability among users without compromising the biometric templates extracted from the legitimate users. The second one is designing a new Similarity Preserving Hash Function (SPHF), currently widely used in the Digital Forensics field to find similarities among different files to calculate their similarity level. The function designed in this research work, besides the fact of improving the results of the two main functions of this field currently in place, it tries to expand its use to the iris template comparison. Finally, the last approach of this thesis is developing a new mechanism of handling the iris templates, considering them as signals, to use the Walsh-Hadamard transform (complemented with three other algorithms) to compare them. The results obtained are excellent taking into account the security and privacy requirements mentioned previously. Every one of the three schemes designed have been implemented to test their operational efficacy in situations that simulate real scenarios: The fuzzy crypto-biometric scheme and the SPHF have been implemented in Java language, while the process based on the Walsh-Hadamard transform in Matlab. The experiments have been performed using a database of iris templates (CASIA-IrisV2) to simulate a user population. The case of the new SPHF designed is special since previous to be applied i to the Biometrics field, it has been also tested to determine its applicability in the Digital Forensic field comparing similar and dissimilar files and images. The ratios of efficiency and effectiveness regarding user authentication, i.e. False Non Match and False Match Rate, for the schemes designed have been calculated with different parameters and cases to analyse their behaviour.
Resumo:
The powers of the General Government are so much greater than those of the United States in its relations with the Local Governments, that the central power must win. The next quarter century was marked by struggle, or rather a series of struggles, between the Dominion Government and those of the various provinces with as a general rule contrary to Macdonal's expectations, the latter proving successful. Ontario was the most consistent opponent of centralizing tendencies; her most notably victory was scored in what is known as the Ontario-Manitoba Boundary Dispute. It is out intention to deal with this question primarily as a phase of post-Confederation politics.
Resumo:
Thesis (Master's)--University of Washington, 2016-06
Resumo:
The powers of the General Government are so much greater than those of the United States in its relations with the Local Governments, that the central power must win. The next quarter century was marked by struggle, or rather a series of struggles, between the Dominion Government and those of the various provinces with as a general rule contrary to Macdonal's expectations, the latter proving successful. Ontario was the most consistent opponent of centralizing tendencies; her most notably victory was scored in what is known as the Ontario-Manitoba Boundary Dispute. It is out intention to deal with this question primarily as a phase of post-Confederation politics.
Resumo:
The fluid flow over bodies with complex geometry has been the subject of research of many scientists and widely explored experimentally and numerically. The present study proposes an Eulerian Immersed Boundary Method for flows simulations over stationary or moving rigid bodies. The proposed method allows the use of Cartesians Meshes. Here, two-dimensional simulations of fluid flow over stationary and oscillating circular cylinders were used for verification and validation. Four different cases were explored: the flow over a stationary cylinder, the flow over a cylinder oscillating in the flow direction, the flow over a cylinder oscillating in the normal flow direction, and a cylinder with angular oscillation. The time integration was carried out by a classical 4th order Runge-Kutta scheme, with a time step of the same order of distance between two consecutive points in x direction. High-order compact finite difference schemes were used to calculate spatial derivatives. The drag and lift coefficients, the lock-in phenomenon and vorticity contour plots were used for the verification and validation of the proposed method. The extension of the current method allowing the study of a body with different geometry and three-dimensional simulations is straightforward. The results obtained show a good agreement with both numerical and experimental results, encouraging the use of the proposed method.
Resumo:
Nontwist systems, common in the dynamical descriptions of fluids and plasmas, possess a shearless curve with a concomitant transport barrier that eliminates or reduces chaotic transport, even after its breakdown. In order to investigate the transport properties of nontwist systems, we analyze the barrier escape time and barrier transmissivity for the standard nontwist map, a paradigm of such systems. We interpret the sensitive dependence of these quantities upon map parameters by investigating chaotic orbit stickiness and the associated role played by the dominant crossing of stable and unstable manifolds. (C) 2009 American Institute of Physics. [doi: 10.1063/1.3247349]
Resumo:
We show that the one-loop effective action at finite temperature for a scalar field with quartic interaction has the same renormalized expression as at zero temperature if written in terms of a certain classical field phi(c), and if we trade free propagators at zero temperature for their finite-temperature counterparts. The result follows if we write the partition function as an integral over field eigenstates (boundary fields) of the density matrix element in the functional Schrodinger field representation, and perform a semiclassical expansion in two steps: first, we integrate around the saddle point for fixed boundary fields, which is the classical field phi(c), a functional of the boundary fields; then, we perform a saddle-point integration over the boundary fields, whose correlations characterize the thermal properties of the system. This procedure provides a dimensionally reduced effective theory for the thermal system. We calculate the two-point correlation as an example.
Resumo:
We use the boundary effective theory approach to thermal field theory in order to calculate the pressure of a system of massless scalar fields with quartic interaction. The method naturally separates the infrared physics, and is essentially nonperturbative. To lowest order, the main ingredient is the solution of the free Euler-Lagrange equation with nontrivial (time) boundary conditions. We derive a resummed pressure, which is in good agreement with recent calculations found in the literature, following a very direct and compact procedure.
Resumo:
We consider a nonlinear system and show the unexpected and surprising result that, even for high dissipation, the mean energy of a particle can attain higher values than when there is no dissipation in the system. We reconsider the time-dependent annular billiard in the presence of inelastic collisions with the boundaries. For some magnitudes of dissipation, we observe the phenomenon of boundary crisis, which drives the particles to an asymptotic attractive fixed point located at a value of energy that is higher than the mean energy of the nondissipative case and so much higher than the mean energy just before the crisis. We should emphasize that the unexpected results presented here reveal the importance of a nonlinear dynamics analysis to explain the paradoxical strategy of introducing dissipation in the system in order to gain energy.
Resumo:
In this work we analyze the dynamical Casimir effect for a massless scalar field confined between two concentric spherical shells considering mixed boundary conditions. We thus generalize a previous result in literature [Phys. Rev. A 78, 032521 (2008)], where the same problem is approached for the field constrained to the Dirichlet-Dirichlet boundary conditions. A general expression for the average number of particle creation is deduced considering an arbitrary law of radial motion of the spherical shells. This expression is then applied to harmonic oscillations of the shells, and the number of particle production is analyzed and compared with the results previously obtained under Dirichlet-Dirichlet boundary conditions.
Resumo:
In this paper we analyze the behavior of the Laplace operator with Neumann boundary conditions in a thin domain of the type R(epsilon) = {(x(1), x(2)) is an element of R(2) vertical bar x(1) is an element of (0, 1), 0 < x(2) < epsilon G(x(1), x(1)/epsilon)} where the function G(x, y) is periodic in y of period L. Observe that the upper boundary of the thin domain presents a highly oscillatory behavior and, moreover, the height of the thin domain, the amplitude and period of the oscillations are all of the same order, given by the small parameter epsilon. (C) 2011 Elsevier Masson SAS. All rights reserved.
Resumo:
This work presents a non-linear boundary element formulation applied to analysis of contact problems. The boundary element method (BEM) is known as a robust and accurate numerical technique to handle this type of problem, because the contact among the solids occurs along their boundaries. The proposed non-linear formulation is based on the use of singular or hyper-singular integral equations by BEM, for multi-region contact. When the contact occurs between crack surfaces, the formulation adopted is the dual version of BEM, in which singular and hyper-singular integral equations are defined along the opposite sides of the contact boundaries. The structural non-linear behaviour on the contact is considered using Coulomb`s friction law. The non-linear formulation is based on the tangent operator in which one uses the derivate of the set of algebraic equations to construct the corrections for the non-linear process. This implicit formulation has shown accurate as the classical approach, however, it is faster to compute the solution. Examples of simple and multi-region contact problems are shown to illustrate the applicability of the proposed scheme. (C) 2011 Elsevier Ltd. All rights reserved.
Resumo:
This paper deals with analysis of multiple random crack propagation in two-dimensional domains using the boundary element method (BEM). BEM is known to be a robust and accurate numerical technique for analysing this type of problem. The formulation adopted in this work is based on the dual BEM, for which singular and hyper-singular integral equations are used. We propose an iterative scheme to predict the crack growth path and the crack length increment at each time step. The proposed scheme able us to simulate localisation and coalescence phenomena, which is the main contribution of this paper. Considering the fracture mechanics analysis, the displacement correlation technique is applied to evaluate the stress intensity factors. The propagation angle and the equivalent stress intensity factor are calculated using the theory of maximum circumferential stress. Examples of simple and multi-fractured domains, loaded up to the rupture, are considered to illustrate the applicability of the proposed scheme. (C) 2010 Elsevier Ltd. All rights reserved.