Search results for "ExAC"
showing 10 items of 1440 documents
A model for multilayered beams undergoing end loads
2013
A formulation for layered beams undergoing end loads, namely axial, shear and bending actions, is developed and presented in this paper. A layer-wise kinematical model is first derived so that the point-wise balance relationships are fulfilled at the layer level. Successively, by enforcing the interface continuity conditions and taking the traction–free conditions on the top and bottom surfaces of the laminate into account, the layer-wise kinematical quantities are written in terms of generalized kinematical variables representative of the beam displacements field. The beam problem is then formulated in terms of these generalized variables leading to a model that shows the positive characte…
A Theory of Laminated Beams Subjected to Axial, Bending and Shear Load
2013
A theory of laminated beams subjected to axial, bending and shear loads is presented in this paper. The kinematical model employed to describe the laminated beam displacement field is layer-wise in nature. Moreover it is such that the equilibrium equations and the continuity of the stress components at plies interfaces are satisfied. By using the whole set of interface continuity conditions in conjunction with the traction –free conditions on the beam top and bottom surfaces the layer-wise kinematical quantities are written in terms of the mechanical primary variables pertaining to one layer only, which are then expressed in terms of the laminated generalized displacements. The solution for…
Electrochemistry of TiO2–iron hexacyanocobaltate composite electrodes
2014
Abstract In this paper we investigate the electrochemical behavior of iron hexacyanocobaltate (FeHCC) in comparison to the cobalt hexacyanoferrate (CoHCF). The best results were achieved on electrochemical synthesized film of FeHCC on the TiO2 modified electrodes. The chemical and physical characterizations confirm the formation of the FeHCC with the classical cubic crystal structure of the Prussian blue analogs, with cell parameter a very close to 10 A, as well as the formation of micro aggregates of TiO2 covered by FeHCC. The synthesis was performed on various substrates such as glassy carbon (GC), graphite foil (GF) and indium tin oxide (ITO) in order to develop new technological applica…
Spectral approach to the scattering map for the semi-classical defocusing Davey–Stewartson II equation
2019
International audience; The inverse scattering approach for the defocusing Davey–Stewartson II equation is given by a system of D-bar equations. We present a numerical approach to semi-classical D-bar problems for real analytic rapidly decreasing potentials. We treat the D-bar problem as a complex linear second order integral equation which is solved with discrete Fourier transforms complemented by a regularization of the singular parts by explicit analytic computation. The resulting algebraic equation is solved either by fixed point iterations or GMRES. Several examples for small values of the semi-classical parameter in the system are discussed.
Efficient formulation of a two-noded geometrically exact curved beam element
2021
The article extends the formulation of a 2D geometrically exact beam element proposed by Jirasek et al. (2021) to curved elastic beams. This formulation is based on equilibrium equations in their integrated form, combined with the kinematic relations and sectional equations that link the internal forces to sectional deformation variables. The resulting first-order differential equations are approximated by the finite difference scheme and the boundary value problem is converted to an initial value problem using the shooting method. The article develops the theoretical framework based on the Navier-Bernoulli hypothesis, with a possible extension to shear-flexible beams. Numerical procedures …
Rational solutions to the KPI equation from particular polynomials
2022
Abstract We construct solutions to the Kadomtsev–Petviashvili equation (KPI) from particular polynomials. We obtain rational solutions written as a second spatial derivative of a logarithm of a determinant of order n . We obtain with this method an infinite hierarchy of rational solutions to the KPI equation. We give explicitly the expressions of these solutions for the first five orders.
A Posteriori Error Bounds for Approximations of the Oseen Problem and Applications to the Uzawa Iteration Algorithm
2014
Abstract. We derive computable bounds of deviations from the exact solution of the stationary Oseen problem. They are applied to approximations generated by the Uzawa iteration method. Also, we derive an advanced form of the estimate, which takes into account approximation errors arising due to discretization of the boundary value problem, generated by the main step of the Uzawa method. Numerical tests confirm our theoretical results and show practical applicability of the estimates.
Scalable Creation of Long-Lived Multipartite Entanglement.
2017
We demonstrate the deterministic generation of multipartite entanglement based on scalable methods. Four qubits are encoded in Ca+40, stored in a microstructured segmented Paul trap. These qubits are sequentially entangled by laser-driven pairwise gate operations. Between these, the qubit register is dynamically reconfigured via ion shuttling operations, where ion crystals are separated and merged, and ions are moved in and out of a fixed laser interaction zone. A sequence consisting of three pairwise entangling gates yields a four-ion Greenberger-Horne-Zeilinger state |ψ=(1/2)(|0000+|1111), and full quantum state tomography reveals a state fidelity of 94.4(3)%. We analyze the decoherence o…
Encriptación óptica empleando llaves Weierstrass-Mandelbrot
2013
[EN] This paper presents the generation of encryption keys using the local oscillating properties of the partial sums of Weierstrass-Mandelbrot fractal function. In this way, the security key can be replicated if the parameters used to obtain it are known. Therefore, these parameters can be sent instead of sending the key. This procedure reduces the amount of information to be sent and prevents possible interception of the key. Moreover, the key can not be affected by data loss or pollution. The effectiveness of the Weierstrass-Mandelbrot keys were demonstrated by computer simulation in a 4f optical encryption system and the double random phase encoding technique. These keys allow us to enc…
Exact Canonical Dressing of Two-Level Atoms by Two-Photon Processes
1984
The aim of this paper is to present new exact results on the subject of dressing of a two-level atom by an electromagnetic field.