969 resultados para Wernher, Philipp WilhelmWernher, Philipp WilhelmPhilipp WilhelmWernher


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Avec prologues et « capitula ». Job (2) ; Tobias (20) ; Judith (27v) ; Esther (37) ; Macchab. I-II (46v) ; Ezechiel (84v) ; XII Proph. min. (122) ; Isaias (151v). — Epist. Pauli, depuis Rom. I, 1, jusqu'à Philipp. 21, et depuis Hebr. II, 18, jusqu'à la fin, avec Epist. ad Laodicenses (184v).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

1.23 m. textual records, 1 col. post card, 1 b&w post card, 116 col. photographs, 59 b&w photographs, 6 negatives, 1 metal logo, 2 photo cuts, 7 woodcuts, 1 VHS tape, 1 stamp/press, 1 guest book, 5 account books

Relevância:

20.00% 20.00%

Publicador:

Resumo:

UANL

Relevância:

20.00% 20.00%

Publicador:

Resumo:

UANL

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In [4], Guillard and Viozat propose a finite volume method for the simulation of inviscid steady as well as unsteady flows at low Mach numbers, based on a preconditioning technique. The scheme satisfies the results of a single scale asymptotic analysis in a discrete sense and comprises the advantage that this can be derived by a slight modification of the dissipation term within the numerical flux function. Unfortunately, it can be observed by numerical experiments that the preconditioned approach combined with an explicit time integration scheme turns out to be unstable if the time step Dt does not satisfy the requirement to be O(M2) as the Mach number M tends to zero, whereas the corresponding standard method remains stable up to Dt=O(M), M to 0, which results from the well-known CFL-condition. We present a comprehensive mathematical substantiation of this numerical phenomenon by means of a von Neumann stability analysis, which reveals that in contrast to the standard approach, the dissipation matrix of the preconditioned numerical flux function possesses an eigenvalue growing like M-2 as M tends to zero, thus causing the diminishment of the stability region of the explicit scheme. Thereby, we present statements for both the standard preconditioner used by Guillard and Viozat [4] and the more general one due to Turkel [21]. The theoretical results are after wards confirmed by numerical experiments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dieser Tagungsband enthält die gesammelten Zusammenfassungen der acht eingereichten Vorträge des 5. Krypto-Tags. Der Kryptotag ist eine zentrale Aktivität der Fachgruppe "Angewandte Kryptologie" der Gesellschaft für Informatik e.V. Er ist eine wissenschaftliche Veranstaltung im Bereich der Kryptologie und von der organisatorischen Arbeit der Fachgruppe getrennt.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article is concerned with the numerical simulation of flows at low Mach numbers which are subject to the gravitational force and strong heat sources. As a specific example for such flows, a fire event in a car tunnel will be considered in detail. The low Mach flow is treated with a preconditioning technique allowing the computation of unsteady flows, while the source terms for gravitation and heat are incorporated via operator splitting. It is shown that a first order discretization in space is not able to compute the buoyancy forces properly on reasonable grids. The feasibility of the method is demonstrated on several test cases.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the present paper we concentrate on solving sequences of nonsymmetric linear systems with block structure arising from compressible flow problems. We attempt to improve the solution process by sharing part of the computational effort throughout the sequence. This is achieved by application of a cheap updating technique for preconditioners which we adapted in order to be used for our applications. Tested on three benchmark compressible flow problems, the strategy speeds up the entire computation with an acceleration being particularly pronounced in phases of instationary behavior.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work is concerned with finite volume methods for flows at low mach numbers which are under buoyancy and heat sources. As a particular application, fires in car tunnels will be considered. To extend the scheme for compressible flow into the low Mach number regime, a preconditioning technique is used and a stability result on this is proven. The source terms for gravity and heat are incorporated using operator splitting and the resulting method is analyzed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With this document, we provide a compilation of in-depth discussions on some of the most current security issues in distributed systems. The six contributions have been collected and presented at the 1st Kassel Student Workshop on Security in Distributed Systems (KaSWoSDS’08). We are pleased to present a collection of papers not only shedding light on the theoretical aspects of their topics, but also being accompanied with elaborate practical examples. In Chapter 1, Stephan Opfer discusses Viruses, one of the oldest threats to system security. For years there has been an arms race between virus producers and anti-virus software providers, with no end in sight. Stefan Triller demonstrates how malicious code can be injected in a target process using a buffer overflow in Chapter 2. Websites usually store their data and user information in data bases. Like buffer overflows, the possibilities of performing SQL injection attacks targeting such data bases are left open by unwary programmers. Stephan Scheuermann gives us a deeper insight into the mechanisms behind such attacks in Chapter 3. Cross-site scripting (XSS) is a method to insert malicious code into websites viewed by other users. Michael Blumenstein explains this issue in Chapter 4. Code can be injected in other websites via XSS attacks in order to spy out data of internet users, spoofing subsumes all methods that directly involve taking on a false identity. In Chapter 5, Till Amma shows us different ways how this can be done and how it is prevented. Last but not least, cryptographic methods are used to encode confidential data in a way that even if it got in the wrong hands, the culprits cannot decode it. Over the centuries, many different ciphers have been developed, applied, and finally broken. Ilhan Glogic sketches this history in Chapter 6.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Die vorliegende Arbeit befasst sich primär mit der Trauerbewältigung von unmittelbaren Angehörigen und Betroffenen nach dem Amoklauf im Erfurter Gutenberg-Gymnasium vom 26. April 2002. Zur Forschungsmethodik wurde als Erhebungsverfahren eine spezielle Technik der qualitativen Inhaltsanalyse nach Philipp Mayring gewählt. Das Anliegen dabei ist, eine Methodik systematischer Interpretation zu verwenden, die an den in jeder Inhaltsanalyse notwendig enthaltenen qualitativen Bestandteilen ansetzt, sie durch Analyseschritte und Analyseregeln systematisiert und überprüfbar macht. Anhand dieser Forschungsmethode werden die Bewältigungsmechanismen der Trauer von Angehörigen und Betroffenen untersucht. Ferner befasst sich die Arbeit mit bis dato vorliegenden Untersuchungen und Hypothesen zum Amoklauf selbst und erstellt hypothetische Überlegungen zum Täterprofil, sowie eine Literaturrecherche zur Ätiologie und Epidemiologie von Amok.