993 resultados para Propagation pattern


Relevância:

70.00% 70.00%

Publicador:

Resumo:

The details of the Element Free Galerkin (EFG) method are presented with the method being applied to a study on hydraulic fracturing initiation and propagation process in a saturated porous medium using coupled hydro-mechanical numerical modelling. In this EFG method, interpolation (approximation) is based on nodes without using elements and hence an arbitrary discrete fracture path can be modelled.The numerical approach is based upon solving two governing partial differential equations of equilibrium and continuity of pore water simultaneously. Displacement increment and pore water pressure increment are discretized using the same EFG shape functions. An incremental constrained Galerkin weak form is used to create the discrete system of equations and a fully implicit scheme is used for discretization in the time domain. Implementation of essential boundary conditions is based on the penalty method. In order to model discrete fractures, the so-called diffraction method is used.Examples are presented and the results are compared to some closed-form solutions and FEM approximations in order to demonstrate the validity of the developed model and its capabilities. The model is able to take the anisotropy and inhomogeneity of the material into account. The applicability of the model is examined by simulating hydraulic fracture initiation and propagation process from a borehole by injection of fluid. The maximum tensile strength criterion and Mohr-Coulomb shear criterion are used for modelling tensile and shear fracture, respectively. The model successfully simulates the leak-off of fluid from the fracture into the surrounding material. The results indicate the importance of pore fluid pressure in the initiation and propagation pattern of fracture in saturated soils. © 2013 Elsevier Ltd.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

A method for spatial electric load forecasting using multi-agent systems, especially suited to simulate the local effect of special loads in distribution systems is presented. The method based on multi-agent systems uses two kinds of agents: reactive and proactive. The reactive agents represent each sub-zone in the service zone, characterizing each one with their corresponding load level, represented in a real number, and their relationships with other sub-zones represented in development probabilities. The proactive agent carry the new load expected to be allocated because of the new special load, this agent distribute the new load in a propagation pattern. The results are presented with maps of future expected load levels in the service zone. The method is tested with data from a mid-size city real distribution system, simulating the effect of a load with attraction and repulsion attributes. The method presents good results and performance. © 2011 IEEE.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

密码算法是信息安全研究的核心内容之一,其实际安全性不仅依赖于密码自身的数学特性,也依赖于具体的实现特性。基于实现的密码分析是一种有别于传统密码分析的新型密码分析方法,它利用算法实现时的信息泄露来恢复秘密信息。差分故障分析(Differential Fault Analysis,简称DFA)就是这样一类重要的密码分析方法。 现代密码学中,密码设计通常基于混淆和扩散这两大基本原则。对于一个分组密码而言,选择一个合适的轮函数并进行若干次迭代可以提供必要的混淆和扩散。因此,目前流行的分组密码均为迭代型密码,所采用的典型结构包括Feistel结构、SPN结构和广义Feistel结构等。这些密码结构及其所采用的基础密码组件(例如,S盒和P置换等)的性质,完全决定了故障在传播过程中所呈现的一些模式。直观上,这种内在特征可以用于挖掘DFA攻击和密码结构之间的关系。因此,完全可能利用这种特征来建立一种面向密码结构的系统化DFA攻击方法。 本文主要研究面向Feistel密码的差分故障分析方法,并探讨这类分析方法与已有可证明安全性理论分析结论之间的关系。为此,引入了故障传播路径(Fault Propagation Path,简称FPPath)和故障传播模式(Fault Propagation Pattern,简称FPPattern)的概念,给出了适用于Feistel结构的 FPPath 和 FPPattern 计算方法,建立了与已有可证明安全性理论结果之间的关系。在此基础上,提出了一种面向Feistel密码的基于故障传播模式的 系统化差分故障分析方法。使用该方法,可编程实现FPPath和FPPattern的自动计算,这将有助于针对Feistel密码的自动化DFA攻击的实施。这种情形下,可将FPPath的长度视作评估DFA攻击有效性的一种度量指标。此外,该系统化方法的必然结果是攻击性能的显著提高:不但攻击轮数有所减少,而且故障植入点数量也会减少,这将迅速降低实施一次成功攻击所需的故障密文数。最后,为验证该方法的正确性和有效性,以Camellia密码算法为具体实例,进行了相关模拟攻击实验研究,并给出了相应的数据复杂度分析和时间复杂度分析。通过充分利用Camellia算法中P置换的性质,在不需要穷举搜索的情况下,新攻击方法仅需要6个故障密文即可完全恢复出128位密钥,而成功恢复出192位或256位密钥所需要的故障密文数则为22个。结果表明,基于FPPattern的DFA方法要优于所有已有同类方法。

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The research area of this paper covers the maximum exploration projects of CNPC, including Blocks 1/2/4 and Block 6 of the Muglad basin and the Melut basin in Bocks 3/7 in Sudan. Based on the study of the evolution history of the Central African Shear Zone (CASZ), structural styles and filling characteristics of the rift basins, it is put forward that the rift basins in Sudan are typical passive rift basins undergoing the strike-slip, extension, compression and inversion since the Cretaceous. The three-stage rift basins overlapped obliquely. The extension and rifting during the Early Cretaceous is 50-70% of the total extension. The features of the passive rift basins decided that there is a single sedimentary cycle and one set of active source rocks within the middle. Influenced by the three-stage rifting and low thermal gradient, hydrocarbon generation and charging took place very late, and the oil pool formation mechanism is very unique from the Lower Cretaceous rift sequences to the Paleogene. The reservoir-seal assemblages are very complicated in time and space. The sealing capacity of cap rocks was controlled by the CASZ. In general the oils become heavier towards the CASZ and lighter far away. The oil biodegradation is the reason causing the high total acid number. The determination of effective reservoir depth ensures that all discovered fields up to now are high-production fields. The propagation and growth of boundary faults in the rift basins can be divided into a simple fault propagation pattern and a fault growth-linkage pattern. It is firstly found that the linkage of boundary fault segments controls the formation of petroleum systems. Three methods have been established to outline petroleum systems. And a new classification scheme of rift-type petroleum system has been put forward: pre-rift, syn-rift (including passive and active) and post-rift petroleum systems. This scheme will be very important for the further exploration of rift basins. This paper firstly established the formation models of oil pools for the passive rift basins in Sudan: the coupling of accommodation zones and main plays for the formation of giant fields. The overlapping of late rifting broke the anticlines to be several fault-blocks. This process determined that anti-fault blocks are the main traptypes in the cretaceous sequences and anticlines in the Paleogene. This can explain why the traptypes are different between the Muglad and Mefut basins, and will provide theoretic guidance for the exploration strategy. The established formation mechanism and models in this paper have had great potential guidance and promotion for the exploration in Sudan, and resulted in significant economic and social benefit. A giant field of 500 million tons oil in place was found 2003. The cost in Blocks 3/7 is only 0.25

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Refraction, interference, and diffraction are distinguishing features of wavelike phenomena. Although they are usually associated only with a purely spatial wave-propagation pattern, analogs to interference and diffraction involving the spatio-temporal dynamics of waves in one dimension have been discussed. We complete the triplet of analogies by discussing how spatio-temporal analogs to refraction are exhibited by a quantum particle in one dimension that is scattering off a step barrier. Similarly, birefringence in spacetime occurs for a spin-1/2 particle in a magnetic field.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this paper, the wave pattern characteristics of shock-induced two-phase nozzle Hows with the quiescent or moving dusty gas ahead of the incident-shock front has been investigated by using high-resolution numerical method. As compared with the corresponding results in single-phase nozzle flows of the pure gas, obvious differences between these two kinds of flows can be obtained.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cat’s claw creeper, Macfadyena unguis-cati (L.) Gentry (Bignoniaceae) is a major environmental weed of riparian areas, rainforest communities and remnant natural vegetation in coastal Queensland and New South Wales, Australia. In densely infested areas, it smothers standing vegetation, including large trees, and causes canopy collapse. Quantitative data on the ecology of this invasive vine are generally lacking. The present study examines the underground tuber traits of M. unguis-cati and explores their links with aboveground parameters at five infested sites spanning both riparian and inland vegetation. Tubers were abundant in terms of density (~1000 per m2), although small in size and low in level of interconnectivity. M. unguis-cati also exhibits multiple stems per plant. Of all traits screened, the link between stand (stem density) and tuber density was the most significant and yielded a promising bivariate relationship for the purposes of estimation, prediction and management of what lies beneath the soil surface of a given M. unguis-cati infestation site. The study also suggests that new recruitment is primarily from seeds, not from vegetative propagation as previously thought. The results highlight the need for future biological-control efforts to focus on introducing specialist seed- and pod-feeding insects to reduce seed-output.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Integral attacks are well-known to be effective against byte-based block ciphers. In this document, we outline how to launch integral attacks against bit-based block ciphers. This new type of integral attack traces the propagation of the plaintext structure at bit-level by incorporating bit-pattern based notations. The new notation gives the attacker more details about the properties of a structure of cipher blocks. The main difference from ordinary integral attacks is that we look at the pattern the bits in a specific position in the cipher block has through the structure. The bit-pattern based integral attack is applied to Noekeon, Serpent and present reduced up to 5, 6 and 7 rounds, respectively. This includes the first attacks on Noekeon and present using integral cryptanalysis. All attacks manage to recover the full subkey of the final round.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper I present an analysis of the language used by the National Endowment for Democracy (NED) on its website (NED, 2008). The specific focus of the analysis is on the NED's high usage of the word “should” revealed in computer assisted corpus analysis using Leximancer. Typically we use the word “should” as a term to propose specific courses of action for ourselves and others. It is a marker of obligation and “oughtness”. In other words, its systematic institutional use can be read as a statement of ethics, of how the NED thinks the world ought to behave. As an ostensibly democracy-promoting institution, and one with a clear agenda of implementing American foreign policy, the ethics of NED are worth understanding. Analysis reveals a pattern of grammatical metaphor in which “should” is often deployed counter intuitively, and sometimes ambiguously, as a truth-making tool rather than one for proposing action. The effect is to present NED's imperatives for action as matters of fact rather than ethical or obligatory claims.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The present rate of technological advance continues to place significant demands on data storage devices. The sheer amount of digital data being generated each year along with consumer expectations, fuels these demands. At present, most digital data is stored magnetically, in the form of hard disk drives or on magnetic tape. The increase in areal density (AD) of magnetic hard disk drives over the past 50 years has been of the order of 100 million times, and current devices are storing data at ADs of the order of hundreds of gigabits per square inch. However, it has been known for some time that the progress in this form of data storage is approaching fundamental limits. The main limitation relates to the lower size limit that an individual bit can have for stable storage. Various techniques for overcoming these fundamental limits are currently the focus of considerable research effort. Most attempt to improve current data storage methods, or modify these slightly for higher density storage. Alternatively, three dimensional optical data storage is a promising field for the information storage needs of the future, offering very high density, high speed memory. There are two ways in which data may be recorded in a three dimensional optical medium; either bit-by-bit (similar in principle to an optical disc medium such as CD or DVD) or by using pages of bit data. Bit-by-bit techniques for three dimensional storage offer high density but are inherently slow due to the serial nature of data access. Page-based techniques, where a two-dimensional page of data bits is written in one write operation, can offer significantly higher data rates, due to their parallel nature. Holographic Data Storage (HDS) is one such page-oriented optical memory technique. This field of research has been active for several decades, but with few commercial products presently available. Another page-oriented optical memory technique involves recording pages of data as phase masks in a photorefractive medium. A photorefractive material is one by which the refractive index can be modified by light of the appropriate wavelength and intensity, and this property can be used to store information in these materials. In phase mask storage, two dimensional pages of data are recorded into a photorefractive crystal, as refractive index changes in the medium. A low-intensity readout beam propagating through the medium will have its intensity profile modified by these refractive index changes and a CCD camera can be used to monitor the readout beam, and thus read the stored data. The main aim of this research was to investigate data storage using phase masks in the photorefractive crystal, lithium niobate (LiNbO3). Firstly the experimental methods for storing the two dimensional pages of data (a set of vertical stripes of varying lengths) in the medium are presented. The laser beam used for writing, whose intensity profile is modified by an amplitudemask which contains a pattern of the information to be stored, illuminates the lithium niobate crystal and the photorefractive effect causes the patterns to be stored as refractive index changes in the medium. These patterns are read out non-destructively using a low intensity probe beam and a CCD camera. A common complication of information storage in photorefractive crystals is the issue of destructive readout. This is a problem particularly for holographic data storage, where the readout beam should be at the same wavelength as the beam used for writing. Since the charge carriers in the medium are still sensitive to the read light field, the readout beam erases the stored information. A method to avoid this is by using thermal fixing. Here the photorefractive medium is heated to temperatures above 150�C; this process forms an ionic grating in the medium. This ionic grating is insensitive to the readout beam and therefore the information is not erased during readout. A non-contact method for determining temperature change in a lithium niobate crystal is presented in this thesis. The temperature-dependent birefringent properties of the medium cause intensity oscillations to be observed for a beam propagating through the medium during a change in temperature. It is shown that each oscillation corresponds to a particular temperature change, and by counting the number of oscillations observed, the temperature change of the medium can be deduced. The presented technique for measuring temperature change could easily be applied to a situation where thermal fixing of data in a photorefractive medium is required. Furthermore, by using an expanded beam and monitoring the intensity oscillations over a wide region, it is shown that the temperature in various locations of the crystal can be monitored simultaneously. This technique could be used to deduce temperature gradients in the medium. It is shown that the three dimensional nature of the recording medium causes interesting degradation effects to occur when the patterns are written for a longer-than-optimal time. This degradation results in the splitting of the vertical stripes in the data pattern, and for long writing exposure times this process can result in the complete deterioration of the information in the medium. It is shown in that simply by using incoherent illumination, the original pattern can be recovered from the degraded state. The reason for the recovery is that the refractive index changes causing the degradation are of a smaller magnitude since they are induced by the write field components scattered from the written structures. During incoherent erasure, the lower magnitude refractive index changes are neutralised first, allowing the original pattern to be recovered. The degradation process is shown to be reversed during the recovery process, and a simple relationship is found relating the time at which particular features appear during degradation and recovery. A further outcome of this work is that the minimum stripe width of 30 ìm is required for accurate storage and recovery of the information in the medium, any size smaller than this results in incomplete recovery. The degradation and recovery process could be applied to an application in image scrambling or cryptography for optical information storage. A two dimensional numerical model based on the finite-difference beam propagation method (FD-BPM) is presented and used to gain insight into the pattern storage process. The model shows that the degradation of the patterns is due to the complicated path taken by the write beam as it propagates through the crystal, and in particular the scattering of this beam from the induced refractive index structures in the medium. The model indicates that the highest quality pattern storage would be achieved with a thin 0.5 mm medium; however this type of medium would also remove the degradation property of the patterns and the subsequent recovery process. To overcome the simplistic treatment of the refractive index change in the FD-BPM model, a fully three dimensional photorefractive model developed by Devaux is presented. This model shows significant insight into the pattern storage, particularly for the degradation and recovery process, and confirms the theory that the recovery of the degraded patterns is possible since the refractive index changes responsible for the degradation are of a smaller magnitude. Finally, detailed analysis of the pattern formation and degradation dynamics for periodic patterns of various periodicities is presented. It is shown that stripe widths in the write beam of greater than 150 ìm result in the formation of different types of refractive index changes, compared with the stripes of smaller widths. As a result, it is shown that the pattern storage method discussed in this thesis has an upper feature size limit of 150 ìm, for accurate and reliable pattern storage.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A method for prediction of the radiation pattern of N strongly coupled antennas with mismatched sources is presented. The method facilitates fast and accurate design of compact arrays. The prediction is based on the measured N-port S parameters of the coupled antennas and the N active element patterns measured in a 50 ω environment. By introducing equivalent power sources, the radiation pattern with excitation by sources with arbitrary impedances and various decoupling and matching networks (DMN) can be accurately predicted without the need for additional measurements. Two experiments were carried out for verification: pattern prediction for parasitic antennas with different loads and for antennas with DMN. The difference between measured and predicted patterns was within 1 to 2 dB.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cat’s claw creeper, Macfadyena unguis-cati (L.) Gentry (Bignoniaceae) is a major environmental weed of riparian areas, rainforest communities and remnant natural vegetation in coastal Queensland and New South Wales, Australia. In densely infested areas, it smothers standing vegetation, including large trees, and causes canopy collapse. Quantitative data on the ecology of this invasive vine are generally lacking. The present study examines the underground tuber traits of M. unguis-cati and explores their links with aboveground parameters at five infested sites spanning both riparian and inland vegetation. Tubers were abundant in terms of density (~1000 per m2), although small in size and low in level of interconnectivity. M. unguis-cati also exhibits multiple stems per plant. Of all traits screened, the link between stand (stem density) and tuber density was the most significant and yielded a promising bivariate relationship for the purposes of estimation, prediction and management of what lies beneath the soil surface of a given M. unguis-cati infestation site. The study also suggests that new recruitment is primarily from seeds, not from vegetative propagation as previously thought. The results highlight the need for future biological-control efforts to focus on introducing specialist seed- and pod-feeding insects to reduce seed-output.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wave propagation and its frequency bandgaps in a parametrically modulated composite laminate are reported in this paper. The modulated properties under considerations are due to periodic microstructure, for example honeycomb core sandwich composite, which can be parameterized and homogenized in a suitable scale. Wave equations are derived by assuming a third-order shear deformation theory. Homogenization of the wave equations is carried out in the scale of wavelength. In-plane wave and flexural-shear wave dispersions are obtained for a range of values of a stiffness modulation coefficient (alpha). A clear pattern of stop-bands is observed for alpha >= 4. To validate the band-gap phenomena, we take recourse to time domain response obtained from finite element simulation. As predicted by the proposed analytical technique, a distinct correlation between the chosen frequency band and the simulated wave arrival time and amplitude reduction is found. This promises practical applications of the proposed analytical technique to designing parametrically modulated composite laminate for wave suppression. (C) 2009 Elsevier B.V. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Layer-wise, distance-dependent orientational relaxation of water confined in reverse micelles (RM) is studied using theoretical and computational tools. We use both a newly constructed ``spins on a ring'' (SOR) Ising-type model (with Shore-Zwanzig rotational dynamics) and atomistic simulations with explicit water. Our study explores the effect of reverse micelle size and role of intermolecular correlations, compromised by the presence of a highly polar surface, on the distance (from the interface) dependence of water relaxation. The ``spins on a ring'' model can capture some aspects of distance dependence of relaxation, such as acceleration of orientational relaxation at intermediate layers. In atomistic simulations, layer-wise decomposition of hydrogen bond formation pattern clearly reveals that hydrogen bond arrangement of water at a certain distance away from the surface can remain frustrated due to the interaction with the polar surface head groups. This layer-wise analysis also reveals the presence of a non-monotonic slow relaxation component which can be attributed to this frustration effect and which is accentuated in small to intermediate size RMs. For large size RMs, the long time component decreases monotonically from the interface to the interior of the RMs with slowest relaxation observed at the interface. (C) 2012 American Institute of Physics. http://dx.doi.org/10.1063/1.4732095]