51,061 research outputs found

    Optimal boundary geometry in an elasticity problem: a systematic adjoint approach

    Get PDF
    p. 509-524In different problems of Elasticity the definition of the optimal geometry of the boundary, according to a given objective function, is an issue of great interest. Finding the shape of a hole in the middle of a plate subjected to an arbitrary loading such that the stresses along the hole minimizes some functional or the optimal middle curved concrete vault for a tunnel along which a uniform minimum compression are two typical examples. In these two examples the objective functional depends on the geometry of the boundary that can be either a curve (in case of 2D problems) or a surface boundary (in 3D problems). Typically, optimization is achieved by means of an iterative process which requires the computation of gradients of the objective function with respect to design variables. Gradients can by computed in a variety of ways, although adjoint methods either continuous or discrete ones are the more efficient ones when they are applied in different technical branches. In this paper the adjoint continuous method is introduced in a systematic way to this type of problems and an illustrative simple example, namely the finding of an optimal shape tunnel vault immersed in a linearly elastic terrain, is presented.Garcia-Palacios, J.; Castro, C.; Samartin, A. (2009). Optimal boundary geometry in an elasticity problem: a systematic adjoint approach. Editorial Universitat Politècnica de València. http://hdl.handle.net/10251/654

    One pion production in neutrino-nucleon scattering and the different parametrizations of the weak NΔN\rightarrow\Delta vertex

    Get PDF
    The NΔN \to \Delta weak vertex provides an important contribution to the one pion production in neutrino-nucleon and neutrino-nucleus scattering for πN\pi N invariant masses below 1.4 GeV. Beyond its interest as a tool in neutrino detection and their background analyses, one pion production in neutrino-nucleon scattering is useful to test predictions based on the quark model and other internal symmetries of strong interactions. Here we try to establish a connection between two commonly used parametrizations of the weak NΔN \to \Delta vertex and form factors (FF) and we study their effects on the determination of the axial coupling C5A(0)C_5^A(0), the common normalization of the axial FF, which is predicted to hold 1.2 by using the PCAC hypothesis. Predictions for the νμpμpπ+\nu_{\mu} p \to \mu^- p\pi^+ total cross sections within the two approaches, which include the resonant Δ++\Delta^{++} and other background contributions in a coherent way, are compared to experimental data.Comment: Submitted to Physics Letters

    Entanglement of two-qubit photon beam by magnetic field

    Full text link
    We have studied the possibility of affecting the entanglement measure of 2-qubit system consisting of two photons with different fixed frequencies but with two arbitrary linear polarizations, moving in the same direction, by the help of an applied external magnetic field. The interaction between the magnetic field and the photons in our model is achieved through intermediate electrons that interact with both the photons and the magnetic field. The possibility of exact theoretical analysis of this scheme is based on known exact solutions that describe the interaction of an electron subjected to an external magnetic field (or a medium of electrons not interacting with each other) with a quantized field of two photons. We adapt these exact solutions to the case under consideration. Using explicit wave functions for the resulting electromagnetic field, we calculate the entanglement measure of the photon beam as a function of the applied magnetic field and parameters of the electron medium

    A second order cone formulation of continuous CTA model

    Get PDF
    The final publication is available at link.springer.comIn this paper we consider a minimum distance Controlled Tabular Adjustment (CTA) model for statistical disclosure limitation (control) of tabular data. The goal of the CTA model is to find the closest safe table to some original tabular data set that contains sensitive information. The measure of closeness is usually measured using l1 or l2 norm; with each measure having its advantages and disadvantages. Recently, in [4] a regularization of the l1 -CTA using Pseudo-Huber func- tion was introduced in an attempt to combine positive characteristics of both l1 -CTA and l2 -CTA. All three models can be solved using appro- priate versions of Interior-Point Methods (IPM). It is known that IPM in general works better on well structured problems such as conic op- timization problems, thus, reformulation of these CTA models as conic optimization problem may be advantageous. We present reformulation of Pseudo-Huber-CTA, and l1 -CTA as Second-Order Cone (SOC) op- timization problems and test the validity of the approach on the small example of two-dimensional tabular data set.Peer ReviewedPostprint (author's final draft
    corecore