304 research outputs found

    Inverse eigenvalue problem for discrete three-diagonal Sturm-Liouville operator and the continuum limit

    Full text link
    In present article the self-contained derivation of eigenvalue inverse problem results is given by using a discrete approximation of the Schroedinger operator on a bounded interval as a finite three-diagonal symmetric Jacobi matrix. This derivation is more correct in comparison with previous works which used only single-diagonal matrix. It is demonstrated that inverse problem procedure is nothing else than well known Gram-Schmidt orthonormalization in Euclidean space for special vectors numbered by the space coordinate index. All the results of usual inverse problem with continuous coordinate are reobtained by employing a limiting procedure, including the Goursat problem -- equation in partial derivatives for the solutions of the inversion integral equation.Comment: 19 pages There were made some additions (and reformulations) to the text making the derivation of the results more precise and understandabl

    Water control technology for production wells

    Get PDF

    ЭлСктроснабТСниС производствСнных ΠΎΠ±ΡŠΠ΅ΠΊΡ‚ΠΎΠ² ΡΡ‚Π°Π½ΠΊΠΎΡΡ‚Ρ€ΠΎΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎΠ³ΠΎ Π·Π°Π²ΠΎΠ΄Π° ООО Β«Π‘Π‘Π—Β», Π³. Бимбирск

    Get PDF
    Выпускная квалификационная Ρ€Π°Π±oΡ‚Π° 171с., 17 рис., 33 Ρ‚Π°Π±Π»., 40источников, 14 ΠΏΡ€ΠΈΠ». ΠšΠ»ΡŽΡ‡Π΅Π²Ρ‹Π΅ слова: элСктроснабТСниС, линия, Π·Π°Π²ΠΎΠ΄, трансформатор, подстанция, элСктро-ΠΏΡ€ΠΈΠ΅ΠΌΠ½ΠΈΠΊ, Π½Π°Π³Ρ€ΡƒΠ·ΠΊΠ°, ΠΎΠ±ΠΎΡ€ΡƒΠ΄ΠΎΠ²Π°Π½ΠΈΠ΅, Ρ‚ΠΎΠΊ, напряТСниС. ΠžΠ±ΡŠΠ΅ΠΊΡ‚ΠΎΠΌ изучСния являСтся элСктричСская Ρ‡Π°ΡΡ‚ΡŒ «Бимбирского ΡΡ‚Π°Π½ΠΊΠΎΡΡ‚Ρ€ΠΎΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎΠ³ΠΎ Π·Π°Π²ΠΎΠ΄Π°Β». ЦСлью Π΄ΠΈΠΏΠ»ΠΎΠΌΠ½ΠΎΠΉ Ρ€Π°Π±oΡ‚Ρ‹ являСтся, ΠΏΡ€ΠΎΠ΅ΠΊΡ‚ΠΈΡ€ΠΎΠ²Π°Π½ΠΈΠ΅ схСмы элСктроснабТСния прСдприятия, Π²Ρ‹Π±ΠΎΡ€ оборудования. ΠŸΡ€ΠΎΡ†Π΅ΡΡ прохоТдСния ΠΏΡ€Π°ΠΊΡ‚ΠΈΠΊΠΈ Π½Π° ΠΈΠ·ΡƒΡ‡Π°Π΅ΠΌΠΎΠΌ ΠΎΠ±ΡŠΠ΅ΠΊΡ‚Π΅, Π²ΠΊΠ»ΡŽΡ‡ΠΈΠ» Π² сСбя сбор исходных Π΄Π°Π½Π½Ρ‹Ρ… ΠΏΠΎ ΠΏΡ€Π΅Π΄ΠΏΡ€ΠΈΡΡ‚ΠΈΡŽ. По Ρ€Π΅Π·ΡƒΠ»ΡŒΡ‚Π°Ρ‚Π°ΠΌ исслСдования создана схСма ΠΏΠΎ ΡΠ»Π΅ΠΊΡ‚Ρ€ΠΎΡΠ½Π°Π±ΠΆΠ΅Π½ΠΈΡŽ ΠΎΡ‚ подстанции энСргосистСмы, Π΄ΠΎ ΠΊΠΎΠ½Π΅Ρ‡Π½ΠΎΠ³ΠΎ элСктро-ΠΏΡ€ΠΈΠ΅ΠΌΠ½ΠΈΠΊΠ°. ΠŸΡ€ΠΎΠΈΠ·Π²Π΅Π΄Ρ‘Π½ Π²Ρ‹Π±ΠΎΡ€: ΠΊΠΎΠΌΠΌΡƒΡ‚Π°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… ΠΎΠ±ΠΎΡ€ΡƒΠ΄ΠΎΠ²Π°Π½ΠΈΠΉ, кабСля ΠΈ ΠΏΡ€ΠΎΠ²ΠΎΠ΄ΠΎΠ², Π° Ρ‚Π°ΠΊΠΆΠ΅ сдСланы Π½Π΅ΠΎΠ±Ρ…ΠΎΠ΄ΠΈΠΌΡ‹Π΅ ΠΏΡ€ΠΎΠ²Π΅Ρ€ΠΊΠΈ. Π’ Ρ€Π°Π±ΠΎΡ‚Π΅ ΠΎΡ‚Ρ€Π°ΠΆΠ΅Π½ экономичСский расчСт Π½Π° ΠΊΠ°ΠΏΠΈΡ‚Π°Π»ΡŒΠ½Ρ‹Π΅ Π·Π°Ρ‚Ρ€Final qualifying rabota 171s., 17 fig., 33 tab., 40istochnikov 14 adj. Keywords: electricity, line, plant, transformer substation, electric receiver, load equipment, current, voltage. The object of study is a part of the electric "Simbirsk machine-tool plant". The aim of the thesis is raboty, designing enterprise power scheme, the choice of equipment. The process of practice in the target object, including the collection of baseline data on the enterprise. The study established the scheme for electricity from the substation power supply system, up to the final electro-receiver. MANUFACTURED choice of switching equipment, cables and wires, as well as the necessary checks are made. The paper reflects the economic calculation of capital costs for the implementation of the scheme adopted. Yo

    Skew-self-adjoint discrete and continuous Dirac type systems: inverse problems and Borg-Marchenko theorems

    Full text link
    New formulas on the inverse problem for the continuous skew-self-adjoint Dirac type system are obtained. For the discrete skew-self-adjoint Dirac type system the solution of a general type inverse spectral problem is also derived in terms of the Weyl functions. The description of the Weyl functions on the interval is given. Borg-Marchenko type uniqueness theorems are derived for both discrete and continuous non-self-adjoint systems too

    TrustedPals: Secure Multiparty Computation Implemented with Smart Cards

    Get PDF
    We study the problem of Secure Multi-party Computation (SMC) in a model where individual processes contain a tamper-proof security module, and introduce the TrustedPals framework, an efficient smart card based implementation of SMC for any number of participating entities in such a model. Security modules can be trusted by other processes and can establish secure channels between each other. However, their availability is restricted by their host, that is, a corrupted party can stop the computation of its own security module as well as drop any message sent by or to its security module. We show that in this model SMC can be implemented by reducing it to a fault-tolerance problem at the level of security modules. Since the critical part of the computation can be executed locally on the smart card, we can compute any function securely with a protocol complexity which is polynomial only in the number of processes (that is, the complexity does not depend on the function which is computed), in contrast to previous approaches

    Inverse spectral problems for Sturm-Liouville operators with singular potentials

    Get PDF
    The inverse spectral problem is solved for the class of Sturm-Liouville operators with singular real-valued potentials from the space W2βˆ’1(0,1)W^{-1}_2(0,1). The potential is recovered via the eigenvalues and the corresponding norming constants. The reconstruction algorithm is presented and its stability proved. Also, the set of all possible spectral data is explicitly described and the isospectral sets are characterized.Comment: Submitted to Inverse Problem

    Generalized Ricci Curvature Bounds for Three Dimensional Contact Subriemannian manifolds

    Get PDF
    Measure contraction property is one of the possible generalizations of Ricci curvature bound to more general metric measure spaces. In this paper, we discover sufficient conditions for a three dimensional contact subriemannian manifold to satisfy this property.Comment: 49 page

    Detecting Botnets Through Log Correlation

    Get PDF
    Botnets, which consist of thousands of compromised machines, can cause a significant threat to other systems by launching Distributed Denial of Service attacks, keylogging, and backdoors. In response to this threat, new effective techniques are needed to detect the presence of botnets. In this paper, we have used an interception technique to monitor Windows Application Programming Interface system calls made by communication applications. Existing approaches for botnet detection are based on finding bot traffic patterns. Our approach does not depend on finding patterns but rather monitors the change of behaviour in the system. In addition, we will present our idea of detecting botnet based on log correlations from different hosts
    • …
    corecore