30 resultados para Injectivity
Resumo:
We consider the Kudla-Millson lift from elliptic modular forms of weight (p+q)/2 to closed q-forms on locally symmetric spaces corresponding to the orthogonal group O(p,q). We study the L²-norm of the lift following the Rallis inner product formula. We compute the contribution at the Archimedian place. For locally symmetric spaces associated to even unimodular lattices, we obtain an explicit formula for the L²-norm of the lift, which often implies that the lift is injective. For O(p,2) we discuss how such injectivity results imply the surjectivity of the Borcherds lift.
Resumo:
Let X : ℝ2 → ℝ2 be a C1 map. Denote by Spec(X) the set of (complex) eigenvalues of DXp when p varies in ℝ2. If there exists ε > 0 such that Spec(X) ∩ (-ε, ε) = ∅, then X is injective. Some applications of this result to the real Keller Jacobian conjecture are discussed.
Resumo:
We consider a class of two-dimensional problems in classical linear elasticity for which material overlapping occurs in the absence of singularities. Of course, material overlapping is not physically realistic, and one possible way to prevent it uses a constrained minimization theory. In this theory, a minimization problem consists of minimizing the total potential energy of a linear elastic body subject to the constraint that the deformation field must be locally invertible. Here, we use an interior and an exterior penalty formulation of the minimization problem together with both a standard finite element method and classical nonlinear programming techniques to compute the minimizers. We compare both formulations by solving a plane problem numerically in the context of the constrained minimization theory. The problem has a closed-form solution, which is used to validate the numerical results. This solution is regular everywhere, including the boundary. In particular, we show numerical results which indicate that, for a fixed finite element mesh, the sequences of numerical solutions obtained with both the interior and the exterior penalty formulations converge to the same limit function as the penalization is enforced. This limit function yields an approximate deformation field to the plane problem that is locally invertible at all points in the domain. As the mesh is refined, this field converges to the exact solution of the plane problem.
Resumo:
The basic goal of this study is to extend old and propose new ways to generate knapsack sets suitable for use in public key cryptography. The knapsack problem and its cryptographic use are reviewed in the introductory chapter. Terminology is based on common cryptographic vocabulary. For example, solving the knapsack problem (which is here a subset sum problem) is termed decipherment. Chapter 1 also reviews the most famous knapsack cryptosystem, the Merkle Hellman system. It is based on a superincreasing knapsack and uses modular multiplication as a trapdoor transformation. The insecurity caused by these two properties exemplifies the two general categories of attacks against knapsack systems. These categories provide the motivation for Chapters 2 and 4. Chapter 2 discusses the density of a knapsack and the dangers of having a low density. Chapter 3 interrupts for a while the more abstract treatment by showing examples of small injective knapsacks and extrapolating conjectures on some characteristics of knapsacks of larger size, especially their density and number. The most common trapdoor technique, modular multiplication, is likely to cause insecurity, but as argued in Chapter 4, it is difficult to find any other simple trapdoor techniques. This discussion also provides a basis for the introduction of various categories of non injectivity in Chapter 5. Besides general ideas of non injectivity of knapsack systems, Chapter 5 introduces and evaluates several ways to construct such systems, most notably the "exceptional blocks" in superincreasing knapsacks and the usage of "too small" a modulus in the modular multiplication as a trapdoor technique. The author believes that non injectivity is the most promising direction for development of knapsack cryptosystema. Chapter 6 modifies two well known knapsack schemes, the Merkle Hellman multiplicative trapdoor knapsack and the Graham Shamir knapsack. The main interest is in aspects other than non injectivity, although that is also exploited. In the end of the chapter, constructions proposed by Desmedt et. al. are presented to serve as a comparison for the developments of the subsequent three chapters. Chapter 7 provides a general framework for the iterative construction of injective knapsacks from smaller knapsacks, together with a simple example, the "three elements" system. In Chapters 8 and 9 the general framework is put into practice in two different ways. Modularly injective small knapsacks are used in Chapter 9 to construct a large knapsack, which is called the congruential knapsack. The addends of a subset sum can be found by decrementing the sum iteratively by using each of the small knapsacks and their moduli in turn. The construction is also generalized to the non injective case, which can lead to especially good results in the density, without complicating the deciphering process too much. Chapter 9 presents three related ways to realize the general framework of Chapter 7. The main idea is to join iteratively small knapsacks, each element of which would satisfy the superincreasing condition. As a whole, none of these systems need become superincreasing, though the development of density is not better than that. The new knapsack systems are injective but they can be deciphered with the same searching method as the non injective knapsacks with the "exceptional blocks" in Chapter 5. The final Chapter 10 first reviews the Chor Rivest knapsack system, which has withstood all cryptanalytic attacks. A couple of modifications to the use of this system are presented in order to further increase the security or make the construction easier. The latter goal is attempted by reducing the size of the Chor Rivest knapsack embedded in the modified system. '
Resumo:
La modélisation géométrique est importante autant en infographie qu'en ingénierie. Notre capacité à représenter l'information géométrique fixe les limites et la facilité avec laquelle on manipule les objets 3D. Une de ces représentations géométriques est le maillage volumique, formé de polyèdres assemblés de sorte à approcher une forme désirée. Certaines applications, tels que le placage de textures et le remaillage, ont avantage à déformer le maillage vers un domaine plus régulier pour faciliter le traitement. On dit qu'une déformation est \emph{quasi-conforme} si elle borne la distorsion. Cette thèse porte sur l’étude et le développement d'algorithmes de déformation quasi-conforme de maillages volumiques. Nous étudions ces types de déformations parce qu’elles offrent de bonnes propriétés de préservation de l’aspect local d’un solide et qu’elles ont été peu étudiées dans le contexte de l’informatique graphique, contrairement à leurs pendants 2D. Cette recherche tente de généraliser aux volumes des concepts bien maitrisés pour la déformation de surfaces. Premièrement, nous présentons une approche linéaire de la quasi-conformité. Nous développons une méthode déformant l’objet vers son domaine paramétrique par une méthode des moindres carrés linéaires. Cette méthode est simple d'implémentation et rapide d'exécution, mais n'est qu'une approximation de la quasi-conformité car elle ne borne pas la distorsion. Deuxièmement, nous remédions à ce problème par une approche non linéaire basée sur les positions des sommets. Nous développons une technique déformant le domaine paramétrique vers le solide par une méthode des moindres carrés non linéaires. La non-linéarité permet l’inclusion de contraintes garantissant l’injectivité de la déformation. De plus, la déformation du domaine paramétrique au lieu de l’objet lui-même permet l’utilisation de domaines plus généraux. Troisièmement, nous présentons une approche non linéaire basée sur les angles dièdres. Cette méthode définit la déformation du solide par les angles dièdres au lieu des positions des sommets du maillage. Ce changement de variables permet une expression naturelle des bornes de distorsion de la déformation. Nous présentons quelques applications de cette nouvelle approche dont la paramétrisation, l'interpolation, l'optimisation et la compression de maillages tétraédriques.
Resumo:
The purpose of this paper is to show that, for a large class of band-dominated operators on $\ell^\infty(Z,U)$, with $U$ being a complex Banach space, the injectivity of all limit operators of $A$ already implies their invertibility and the uniform boundedness of their inverses. The latter property is known to be equivalent to the invertibility at infinity of $A$, which, on the other hand, is often equivalent to the Fredholmness of $A$. As a consequence, for operators $A$ in the Wiener algebra, we can characterize the essential spectrum of $A$ on $\ell^p(Z,U)$, regardless of $p\in[1,\infty]$, as the union of point spectra of its limit operators considered as acting on $\ell^p(Z,U)$.
Resumo:
In the first half of this memoir we explore the interrelationships between the abstract theory of limit operators (see e.g. the recent monographs of Rabinovich, Roch and Silbermann (2004) and Lindner (2006)) and the concepts and results of the generalised collectively compact operator theory introduced by Chandler-Wilde and Zhang (2002). We build up to results obtained by applying this generalised collectively compact operator theory to the set of limit operators of an operator (its operator spectrum). In the second half of this memoir we study bounded linear operators on the generalised sequence space , where and is some complex Banach space. We make what seems to be a more complete study than hitherto of the connections between Fredholmness, invertibility, invertibility at infinity, and invertibility or injectivity of the set of limit operators, with some emphasis on the case when the operator is a locally compact perturbation of the identity. Especially, we obtain stronger results than previously known for the subtle limiting cases of and . Our tools in this study are the results from the first half of the memoir and an exploitation of the partial duality between and and its implications for bounded linear operators which are also continuous with respect to the weaker topology (the strict topology) introduced in the first half of the memoir. Results in this second half of the memoir include a new proof that injectivity of all limit operators (the classic Favard condition) implies invertibility for a general class of almost periodic operators, and characterisations of invertibility at infinity and Fredholmness for operators in the so-called Wiener algebra. In two final chapters our results are illustrated by and applied to concrete examples. Firstly, we study the spectra and essential spectra of discrete Schrödinger operators (both self-adjoint and non-self-adjoint), including operators with almost periodic and random potentials. In the final chapter we apply our results to integral operators on .
Resumo:
We study the homogeneous Riemann-Hilbert problem with a vanishing scalar-valued continuous coefficient. We characterize non-existence of nontrivial solutions in the case where the coefficient has its values along several rays starting from the origin. As a consequence, some results on injectivity and existence of eigenvalues of Toeplitz operators in Hardy spaces are obtained.
Resumo:
Let Y = (f, g, h): R(3) -> R(3) be a C(2) map and let Spec(Y) denote the set of eigenvalues of the derivative DY(p), when p varies in R(3). We begin proving that if, for some epsilon > 0, Spec(Y) boolean AND (-epsilon, epsilon) = empty set, then the foliation F(k), with k is an element of {f, g, h}, made up by the level surfaces {k = constant}, consists just of planes. As a consequence, we prove a bijectivity result related to the three-dimensional case of Jelonek`s Jacobian Conjecture for polynomial maps of R(n).
Resumo:
Deep bed filtration occurs in several industrial and environmental processes like water filtration and soil contamination. In petroleum industry, deep bed filtration occurs near to injection wells during water injection, causing injectivity reduction. It also takes place during well drilling, sand production control, produced water disposal in aquifers, etc. The particle capture in porous media can be caused by different physical mechanisms (size exclusion, electrical forces, bridging, gravity, etc). A statistical model for filtration in porous media is proposed and analytical solutions for suspended and retained particles are derived. The model, which incorporates particle retention probability, is compared with the classical deep bed filtration model allowing a physical interpretation of the filtration coefficients. Comparison of the obtained analytical solutions for the proposed model with the classical model solutions allows concluding that the larger the particle capture probability, the larger the discrepancy between the proposed and the classical models
Resumo:
The gas injection has become the most important IOR process in the United States. Furthermore, the year 2006 marks the first time the gas injection IOR production has surpassed that of steam injection. In Brazil, the installation of a petrochemical complex in the Northeast of Brazil (Bahia State) offers opportunities for the injection of gases in the fields located in the Recôncavo Basin. Field-scale gas injection applications have almost always been associated with design and operational difficulties. The mobility ratio, which controls the volumetric sweep, between the injected gas and displaced oil bank in gas processes, is typically unfavorable due to the relatively low viscosity of the injected gas. Furthermore, the difference between their densities results in severe gravity segregation of fluids in the reservoirs, consequently leading to poor control in the volumetric sweep. Nowadays, from the above applications of gas injection, the WAG process is most popular. However, in attempting to solve the mobility problems, the WAG process gives rise to other problems associated with increased water saturation in the reservoir including diminished gas injectivity and increased competition to the flow of oil. The low field performance of WAG floods with oil recoveries in the range of 5-10% is a clear indication of these problems. In order to find na effective alternative to WAG, the Gas Assisted Gravity Drainage (GAGD) was developed. This process is designed to take advantage of gravity force to allow vertical segregation between the injected CO2 and reservoir crude oil due to their density difference. This process consists of placing horizontal producers near the bottom of the pay zone and injecting gás through existing vertical wells in field. Homogeneous models were used in this work which can be extrapolated to commercial application for fields located in the Northeast of Brazil. The simulations were performed in a CMG simulator, the STARS 2007.11, where some parameters and their interactions were analyzed. The results have shown that the CO2 injection in GAGD process increased significantly the rate and the final recovery of oil
Resumo:
Waterflooding is a technique largely applied in the oil industry. The injected water displaces oil to the producer wells and avoid reservoir pressure decline. However, suspended particles in the injected water may cause plugging of pore throats causing formation damage (permeability reduction) and injectivity decline during waterflooding. When injectivity decline occurs it is necessary to increase the injection pressure in order to maintain water flow injection. Therefore, a reliable prediction of injectivity decline is essential in waterflooding projects. In this dissertation, a simulator based on the traditional porous medium filtration model (including deep bed filtration and external filter cake formation) was developed and applied to predict injectivity decline in perforated wells (this prediction was made from history data). Experimental modeling and injectivity decline in open-hole wells is also discussed. The injectivity of modeling showed good agreement with field data, which can be used to support plan stimulation injection wells
Resumo:
Stimulation operations have with main objective restore or improve the productivity or injectivity rate in wells. Acidizing is one of the most important operations of well stimulation, consist in inject acid solutions in the formation under fracture formation pressure. Acidizing have like main purpose remove near wellbore damage, caused by drilling or workover operations, can be use in sandstones and in carbonate formations. A critical step in acidizing operation is the control of acid-formation reaction. The high kinetic rate of this reaction, promotes the consumed of the acid in region near well, causing that the acid treatment not achive the desired distance. In this way, the damage zone can not be bypassed. The main objective of this work was obtain stable systems resistant to the different conditions found in field application, evaluate the kinetic of calcite dissolution in microemulsion systems and simulate the injection of this systems by performing experiments in plugs. The systems were obtained from two non ionic surfactants, Unitol L90 and Renex 110, with sec-butanol and n-butanol like cosurfactants. The oily component of the microemlsion was xilene and kerosene. The acqueous component was a solution of HCl 15-26,1%. The results shown that the microemulsion systems obtained were stable to temperature until 100ºC, high calcium concentrations, salinity until 35000 ppm and HCl concentrations until 25%. The time for calcite dissolution in microemulsion media was 14 times slower than in aqueous HCl 15%. The simulation in plugs showed that microemulsion systems promote a distributed flux and promoted longer channels. The permeability enhancement was between 177 - 890%. The results showed that the microemulsion systems obtained have potential to be applied in matrix acidizing
Resumo:
Injectivity decline, which can be caused by particle retention, generally occurs during water injection or reinjection in oil fields. Several mechanisms, including straining, are responsible for particle retention and pore blocking causing formation damage and injectivity decline. Predicting formation damage and injectivity decline is essential in waterflooding projects. The Classic Model (CM), which incorporates filtration coefficients and formation damage functions, has been widely used to predict injectivity decline. However, various authors have reported significant discrepancies between Classical Model and experimental results, motivating the development of deep bed filtration models considering multiple particle retention mechanisms (Santos & Barros, 2010; SBM). In this dissertation, inverse problem solution was studied and a software for experimental data treatment was developed. Finally, experimental data were fitted using both the CM and SBM. The results showed that, depending on the formation damage function, the predictions for injectivity decline using CM and SBM models can be significantly different
Resumo:
We propose an alternative formalism to simulate cosmic microwave background (CMB) temperature maps in Lambda CDM universes with nontrivial spatial topologies. This formalism avoids the need to explicitly compute the eigenmodes of the Laplacian operator in the spatial sections. Instead, the covariance matrix of the coefficients of the spherical harmonic decomposition of the temperature anisotropies is expressed in terms of the elements of the covering group of the space. We obtain a decomposition of the correlation matrix that isolates the topological contribution to the CMB temperature anisotropies out of the simply connected contribution. A further decomposition of the topological signature of the correlation matrix for an arbitrary topology allows us to compute it in terms of correlation matrices corresponding to simpler topologies, for which closed quadrature formulas might be derived. We also use this decomposition to show that CMB temperature maps of (not too large) multiply connected universes must show patterns of alignment, and propose a method to look for these patterns, thus opening the door to the development of new methods for detecting the topology of our Universe even when the injectivity radius of space is slightly larger than the radius of the last scattering surface. We illustrate all these features with the simplest examples, those of flat homogeneous manifolds, i.e., tori, with special attention given to the cylinder, i.e., T-1 topology.