1000 resultados para Boundary preserving


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Wright-Fisher model is an Itô stochastic differential equation that was originally introduced to model genetic drift within finite populations and has recently been used as an approximation to ion channel dynamics within cardiac and neuronal cells. While analytic solutions to this equation remain within the interval [0,1], current numerical methods are unable to preserve such boundaries in the approximation. We present a new numerical method that guarantees approximations to a form of Wright-Fisher model, which includes mutation, remain within [0,1] for all time with probability one. Strong convergence of the method is proved and numerical experiments suggest that this new scheme converges with strong order 1/2. Extending this method to a multidimensional case, numerical tests suggest that the algorithm still converges strongly with order 1/2. Finally, numerical solutions obtained using this new method are compared to those obtained using the Euler-Maruyama method where the Wiener increment is resampled to ensure solutions remain within [0,1].

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The behaviour of ion channels within cardiac and neuronal cells is intrinsically stochastic in nature. When the number of channels is small this stochastic noise is large and can have an impact on the dynamics of the system which is potentially an issue when modelling small neurons and drug block in cardiac cells. While exact methods correctly capture the stochastic dynamics of a system they are computationally expensive, restricting their inclusion into tissue level models and so approximations to exact methods are often used instead. The other issue in modelling ion channel dynamics is that the transition rates are voltage dependent, adding a level of complexity as the channel dynamics are coupled to the membrane potential. By assuming that such transition rates are constant over each time step, it is possible to derive a stochastic differential equation (SDE), in the same manner as for biochemical reaction networks, that describes the stochastic dynamics of ion channels. While such a model is more computationally efficient than exact methods we show that there are analytical problems with the resulting SDE as well as issues in using current numerical schemes to solve such an equation. We therefore make two contributions: develop a different model to describe the stochastic ion channel dynamics that analytically behaves in the correct manner and also discuss numerical methods that preserve the analytical properties of the model.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Two new concepts for molecular solids, 'local similarity' and 'boundary-preserving isometry', are defined mathematically and a theorem which relates these concepts is formulated. 'Locally similar' solids possess an identical short-range structure and a 'boundary-preserving isometry' is a new mathematical operation on a finite region of a solid that transforms mathematically a given solid to a locally similar one. It is shown further that the existence of such a 'boundary-preserving isometry' in a given solid has infinitely many 'locally similar' solids as a consequence. Chemical implications, referring to the similarity of X-ray powder patterns and patent registration, are discussed as well. These theoretical concepts, which are first introduced in a schematic manner, are proved to exist in nature by the elucidation of the crystal structure of some diketopyrrolopyrrole (DPP) derivatives with surprisingly similar powder patterns. Although the available powder patterns were not indexable, the underlying crystals could be elucidated by using the new technique of ab initio prediction of possible polymorphs and a subsequent Rietveld refinement. Further ab initio packing calculations on other molecules reveal that 'local crystal similarity' is not restricted to DPP derivatives and should also be exhibited by other molecules such as quinacridones. The 'boundary-preserving isometry' is presented as a predictive tool for crystal engineering purposes and attempts to detect it in crystals of the Cambridge Structural Database (CSD) are reported.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Measurements of both the velocity and the temperature field have been made in the thermal layer that grows inside a turbulent boundary layer which is subjected to a small step change in surface heat flux. Upstream of the step, the wall heat flux is zero and the velocity boundary layer is nearly self-preserving. The thermal-layer measurements are discussed in the context of a self-preserving analysis for the temperature disturbance which grows underneath a thick external turbulent boundary layer. A logarithmic mean temperature profile is established downstream of the step but the budget for the mean-square temperature fluctuations shows that, in the inner region of the thermal layer, the production and dissipation of temperature fluctuations are not quite equal at the furthest downstream measurement station. The measurements for both the mean and the fluctuating temperature field indicate that the relaxation distance for the thermal layer is quite large, of the order of 1000θ0, where θ0 is the momentum thickness of the boundary layer at the step. Statistics of the thermal-layer interface and conditionally sampled measurements with respect to this interface are presented. Measurements of the temperature intermittency factor indicate that the interface is normally distributed with respect to its mean position. Near the step, the passive heat contaminant acts as an effective marker of the organized turbulence structure that has been observed in the wall region of a boundary layer. Accordingly, conditional averages of Reynolds stresses and heat fluxes measured in the heated part of the flow are considerably larger than the conventional averages when the temperature intermittency factor is small.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An application of direct methods to dynamic security assessment of power systems using structure-preserving energy functions (SPEF) is presented. The transient energy margin (TEM) is used as an index for checking the stability of the system as well as ranking the contigencies based on their severity. The computation of the TEM requires the evaluation of the critical energy and the energy at fault clearing. Usually this is done by simulating the faulted trajectory, which is time-consuming. In this paper, a new algorithm which eliminates the faulted trajectory estimation is presented to calculate the TEM. The system equations and the SPEF are developed using the centre-of-inertia (COI) formulation and the loads are modelled as arbitrary functions of the respective bus voltages. The critical energy is evaluated using the potential energy boundary surface (PEBS) method. The method is illustrated by considering two realistic power system examples.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis outlines the construction of several types of structured integrators for incompressible fluids. We first present a vorticity integrator, which is the Hamiltonian counterpart of the existing Lagrangian-based fluid integrator. We next present a model-reduced variational Eulerian integrator for incompressible fluids, which combines the efficiency gains of dimension reduction, the qualitative robustness to coarse spatial and temporal resolutions of geometric integrators, and the simplicity of homogenized boundary conditions on regular grids to deal with arbitrarily-shaped domains with sub-grid accuracy.

Both these numerical methods involve approximating the Lie group of volume-preserving diffeomorphisms by a finite-dimensional Lie-group and then restricting the resulting variational principle by means of a non-holonomic constraint. Advantages and limitations of this discretization method will be outlined. It will be seen that these derivation techniques are unable to yield symplectic integrators, but that energy conservation is easily obtained, as is a discretized version of Kelvin's circulation theorem.

Finally, we outline the basis of a spectral discrete exterior calculus, which may be a useful element in producing structured numerical methods for fluids in the future.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Some dynamical properties present in a problem concerning the acceleration of particles in a wave packet are studied. The dynamics of the model is described in terms of a two-dimensional area preserving map. We show that the phase space is mixed in the sense that there are regular and chaotic regions coexisting. We use a connection with the standard map in order to find the position of the first invariant spanning curve which borders the chaotic sea. We find that the position of the first invariant spanning curve increases as a power of the control parameter with the exponent 2/3. The standard deviation of the kinetic energy of an ensemble of initial conditions obeys a power law as a function of time, and saturates after some crossover. Scaling formalism is used in order to characterise the chaotic region close to the transition from integrability to nonintegrability and a relationship between the power law exponents is derived. The formalism can be applied in many different systems with mixed phase space. Then, dissipation is introduced into the model and therefore the property of area preservation is broken, and consequently attractors are observed. We show that after a small change of the dissipation, the chaotic attractor as well as its basin of attraction are destroyed, thus leading the system to experience a boundary crisis. The transient after the crisis follows a power law with exponent -2. (C) 2011 Elsevier Ltd. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Al Shomou Silicilyte Member (Athel Formation) in the South Oman Salt Basin shares many of the characteristics of a light, tight-oil (LTO) reservoir: it is a prolifi c source rock mature for light oil, it produces light oil from a very tight matrix and reservoir, and hydraulic fracking technology is required to produce the oil. What is intriguing about the Al Shomou Silicilyte, and different from other LTO reservoirs, is its position related to the Precambrian/Cambrian Boundary (PCB) and the fact that it is a ‘laminated chert‘ rather than a shale. In an integrated diagenetic study we applied microstructural analyses (SEM, BSE) combined with state-of-the-art stable isotope and trace element analysis of the silicilyte matrix and fractures. Fluid inclusion microthermometry was applied to record the salinity and minimum trapping temperatures. The microstructural investigations reveal a fi ne lamination of the silicilyte matrix with a mean lamina thickness of ca. 20 μm consisting of predominantly organic matter-rich and fi nely crystalline quartz-rich layers, respectively. Authigenic, micron-sized idiomorphic quartz crystals are the main matrix components of the silicilyte. Other diagenetic phases are pyrite, apatite, dolomite, magnesite and barite cements. Porosity values based on neutron density logs and core plug data indicate porosity in the silicilyte ranges from less than 2% to almost to 40%. The majority of the pore space in the silicilyte is related to (primary) inter-crystalline pores, with locally important oversized secondary pores. Pore casts of the silica matrix show that pores are extremely irregular in three dimensions, and are generally interconnected by a complex web or meshwork of fi ne elongate pore throats. Mercury injection capillary data are in line with the microstructural observations suggesting two populations of pore throats, with an effective average modal diameter of 0.4 μm. The acquired geochemical data support the interpretation that the primary source of the silica is the ambient seawater rather than hydrothermal or biogenic. A maximum temperature of ca. 45°C for the formation of microcrystalline quartz in the silicilyte is good evidence that the lithifi cation and crystallization of quartz occurred in the fi rst 5 Ma after deposition. Several phases of brittle fracturing and mineralization occurred in response to salt tectonics during burial. The sequences of fracture-fi lling mineral phases (dolomite - layered chalcedony – quartz – apatite - magnesite I+II - barite – halite) indicates a complex fl uid evolution after silicilyte lithifi cation. Primary, all-liquid fl uid inclusions in the fracturefi lling quartz are good evidence of growth beginning at low temperatures, i.e. ≤ 50ºC. Continuous precipitation during increasing temperature and burial is documented by primary two-phase fl uid inclusions in quartz cements that show brines at 50°C and fi rst hydrocarbons at ca. 70°C. The absolute timing of each mineral phase can be constrained based on U-Pb geochronometry, and basin modelling. Secondary fl uid inclusions in quartz, magnesite and barite indicate reactivation of the fracture system after peak burial temperature during the major cooling event, i.e. uplift, between 450 and 310 Ma. A number of fi rst-order trends in porosity and reservoir-quality distribution are observed which are strongly related to the diagenetic and fl uid history of the reservoir: the early in-situ generation of hydrocarbons and overpressure development arrests diagenesis and preserves matrix porosity. Chemical compaction by pressure dissolution in the fl ank areas could be a valid hypothesis to explain the porosity variations in the silicilitye slabs resulting in lower porosity and poorer connectivity on the fl anks of the reservoir. Most of the hydrocarbon storage and production comes from intervals characterized by Amthor et al. 114488 preserved micropores, not hydrocarbon storage in a fracture system. The absence of oil expulsion results in present-day high oil saturations. The main diagenetic modifi cations of the silicilyte occurred and were completed relatively early in its history, i.e. before 300 Ma. An instrumental factor for preserving matrix porosity is the diffi culty for a given slab to evacuate all the fl uids (water and hydrocarbons), or in other words, the very good sealing capacity of the salt embedding the slab.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

El extraordinario auge de las nuevas tecnologías de la información, el desarrollo de la Internet de las Cosas, el comercio electrónico, las redes sociales, la telefonía móvil y la computación y almacenamiento en la nube, han proporcionado grandes beneficios en todos los ámbitos de la sociedad. Junto a éstos, se presentan nuevos retos para la protección y privacidad de la información y su contenido, como la suplantación de personalidad y la pérdida de la confidencialidad e integridad de los documentos o las comunicaciones electrónicas. Este hecho puede verse agravado por la falta de una frontera clara que delimite el mundo personal del mundo laboral en cuanto al acceso de la información. En todos estos campos de la actividad personal y laboral, la Criptografía ha jugado un papel fundamental aportando las herramientas necesarias para garantizar la confidencialidad, integridad y disponibilidad tanto de la privacidad de los datos personales como de la información. Por otro lado, la Biometría ha propuesto y ofrecido diferentes técnicas con el fin de garantizar la autentificación de individuos a través del uso de determinadas características personales como las huellas dáctilares, el iris, la geometría de la mano, la voz, la forma de caminar, etc. Cada una de estas dos ciencias, Criptografía y Biometría, aportan soluciones a campos específicos de la protección de datos y autentificación de usuarios, que se verían enormemente potenciados si determinadas características de ambas ciencias se unieran con vistas a objetivos comunes. Por ello es imperativo intensificar la investigación en estos ámbitos combinando los algoritmos y primitivas matemáticas de la Criptografía con la Biometría para dar respuesta a la demanda creciente de nuevas soluciones más técnicas, seguras y fáciles de usar que potencien de modo simultáneo la protección de datos y la identificacíón de usuarios. En esta combinación el concepto de biometría cancelable ha supuesto una piedra angular en el proceso de autentificación e identificación de usuarios al proporcionar propiedades de revocación y cancelación a los ragos biométricos. La contribución de esta tesis se basa en el principal aspecto de la Biometría, es decir, la autentificación segura y eficiente de usuarios a través de sus rasgos biométricos, utilizando tres aproximaciones distintas: 1. Diseño de un esquema criptobiométrico borroso que implemente los principios de la biometría cancelable para identificar usuarios lidiando con los problemas acaecidos de la variabilidad intra e inter-usuarios. 2. Diseño de una nueva función hash que preserva la similitud (SPHF por sus siglas en inglés). Actualmente estas funciones se usan en el campo del análisis forense digital con el objetivo de buscar similitudes en el contenido de archivos distintos pero similares de modo que se pueda precisar hasta qué punto estos archivos pudieran ser considerados iguales. La función definida en este trabajo de investigación, además de mejorar los resultados de las principales funciones desarrolladas hasta el momento, intenta extender su uso a la comparación entre patrones de iris. 3. Desarrollando un nuevo mecanismo de comparación de patrones de iris que considera tales patrones como si fueran señales para compararlos posteriormente utilizando la transformada de Walsh-Hadarmard. Los resultados obtenidos son excelentes teniendo en cuenta los requerimientos de seguridad y privacidad mencionados anteriormente. Cada uno de los tres esquemas diseñados han sido implementados para poder realizar experimentos y probar su eficacia operativa en escenarios que simulan situaciones reales: El esquema criptobiométrico borroso y la función SPHF han sido implementados en lenguaje Java mientras que el proceso basado en la transformada de Walsh-Hadamard en Matlab. En los experimentos se ha utilizado una base de datos de imágenes de iris (CASIA) para simular una población de usuarios del sistema. En el caso particular de la función de SPHF, además se han realizado experimentos para comprobar su utilidad en el campo de análisis forense comparando archivos e imágenes con contenido similar y distinto. En este sentido, para cada uno de los esquemas se han calculado los ratios de falso negativo y falso positivo. ABSTRACT The extraordinary increase of new information technologies, the development of Internet of Things, the electronic commerce, the social networks, mobile or smart telephony and cloud computing and storage, have provided great benefits in all areas of society. Besides this fact, there are new challenges for the protection and privacy of information and its content, such as the loss of confidentiality and integrity of electronic documents and communications. This is exarcebated by the lack of a clear boundary between the personal world and the business world as their differences are becoming narrower. In both worlds, i.e the personal and the business one, Cryptography has played a key role by providing the necessary tools to ensure the confidentiality, integrity and availability both of the privacy of the personal data and information. On the other hand, Biometrics has offered and proposed different techniques with the aim to assure the authentication of individuals through their biometric traits, such as fingerprints, iris, hand geometry, voice, gait, etc. Each of these sciences, Cryptography and Biometrics, provides tools to specific problems of the data protection and user authentication, which would be widely strengthen if determined characteristics of both sciences would be combined in order to achieve common objectives. Therefore, it is imperative to intensify the research in this area by combining the basics mathematical algorithms and primitives of Cryptography with Biometrics to meet the growing demand for more secure and usability techniques which would improve the data protection and the user authentication. In this combination, the use of cancelable biometrics makes a cornerstone in the user authentication and identification process since it provides revocable or cancelation properties to the biometric traits. The contributions in this thesis involve the main aspect of Biometrics, i.e. the secure and efficient authentication of users through their biometric templates, considered from three different approaches. The first one is designing a fuzzy crypto-biometric scheme using the cancelable biometric principles to take advantage of the fuzziness of the biometric templates at the same time that it deals with the intra- and inter-user variability among users without compromising the biometric templates extracted from the legitimate users. The second one is designing a new Similarity Preserving Hash Function (SPHF), currently widely used in the Digital Forensics field to find similarities among different files to calculate their similarity level. The function designed in this research work, besides the fact of improving the results of the two main functions of this field currently in place, it tries to expand its use to the iris template comparison. Finally, the last approach of this thesis is developing a new mechanism of handling the iris templates, considering them as signals, to use the Walsh-Hadamard transform (complemented with three other algorithms) to compare them. The results obtained are excellent taking into account the security and privacy requirements mentioned previously. Every one of the three schemes designed have been implemented to test their operational efficacy in situations that simulate real scenarios: The fuzzy crypto-biometric scheme and the SPHF have been implemented in Java language, while the process based on the Walsh-Hadamard transform in Matlab. The experiments have been performed using a database of iris templates (CASIA-IrisV2) to simulate a user population. The case of the new SPHF designed is special since previous to be applied i to the Biometrics field, it has been also tested to determine its applicability in the Digital Forensic field comparing similar and dissimilar files and images. The ratios of efficiency and effectiveness regarding user authentication, i.e. False Non Match and False Match Rate, for the schemes designed have been calculated with different parameters and cases to analyse their behaviour.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The powers of the General Government are so much greater than those of the United States in its relations with the Local Governments, that the central power must win. The next quarter century was marked by struggle, or rather a series of struggles, between the Dominion Government and those of the various provinces with as a general rule contrary to Macdonal's expectations, the latter proving successful. Ontario was the most consistent opponent of centralizing tendencies; her most notably victory was scored in what is known as the Ontario-Manitoba Boundary Dispute. It is out intention to deal with this question primarily as a phase of post-Confederation politics.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Thesis (Master's)--University of Washington, 2016-06

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The powers of the General Government are so much greater than those of the United States in its relations with the Local Governments, that the central power must win. The next quarter century was marked by struggle, or rather a series of struggles, between the Dominion Government and those of the various provinces with as a general rule contrary to Macdonal's expectations, the latter proving successful. Ontario was the most consistent opponent of centralizing tendencies; her most notably victory was scored in what is known as the Ontario-Manitoba Boundary Dispute. It is out intention to deal with this question primarily as a phase of post-Confederation politics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, a space fractional di®usion equation (SFDE) with non- homogeneous boundary conditions on a bounded domain is considered. A new matrix transfer technique (MTT) for solving the SFDE is proposed. The method is based on a matrix representation of the fractional-in-space operator and the novelty of this approach is that a standard discretisation of the operator leads to a system of linear ODEs with the matrix raised to the same fractional power. Analytic solutions of the SFDE are derived. Finally, some numerical results are given to demonstrate that the MTT is a computationally e±cient and accurate method for solving SFDE.