The paper presents a method of how the nonlinear boundary condition [1] may be applied in nonlinear problems of electromagnetic field theory. It is introduced for problems with nonlinear conductivity. An analytical procedure has been constructed, which seeks to reduce calculations related with the nonlinear region. In order to verify the proposed solutions, two problems have been formulated: one of linear and the other of cylindrical symmetry. These have been additionally solved by the authors’ modification of the perturbation method that has been described in previous papers [7, 8, 10]. The electromagnetic field distribution obtained thereby has served as a referential result since it can obtain very accurate solutions [10]. Relative errors of electric and magnetic field strength are introduced to verify the results.
This paper concerns an approach to model the ledger-stand joints of modular scaffolds. Based on the analysis of the working range of the ledger (represented by a linear relationship between load and displacement), two models of the ledger-stand joint are analysed: first – with flexibility joints and second – with rigid joints and with a transition part of lower stiffness. Parameters are selected based on displacement measurements and numerical analyses of joints, then they are verified. On the basis of performed research, it can be stated that both methods of joint modelling recommended in this paper, can be applied in engineering practices.
In this paper a mathematical model enabling the analysis of the heat-flow phenomena occurring in the waterwalls of the combustion chambers of the boilers for supercritical parameters is proposed. It is a one-dimensional model with distributed parameters based on the solution of equations describing the conservation laws of mass, momentum, and energy. The purpose of the numerical calculations is to determine the distributions of the fluid enthalpy and the temperature of the waterwall pipes. This temperature should not exceed the calculation temperature for particular category of steel. The derived differential equations are solved using two methods: with the use of the implicit difference scheme, in which the mesh with regular nodes was applied, and using the Runge-Kutta method. The temperature distribution of the waterwall pipes is determined using the CFD. All thermophysical properties of the fluid and waterwall pipes are computed in real-time. The time-spatial heat transfer coefficient distribution is also computed in the on-line mode. The heat calculations for the combustion chamber are carried out with the use of the zone method, thus the thermal load distribution of the waterwalls is known. The time needed for the computations is of great importance when taking into consideration calculations carried out in the on-line mode. A correctly solved one-dimensional model ensures the appropriately short computational time.
This paper aims to present a new equivalent scheme of multi-windings traction transformers, based on multiport purely inductive circuit. The mathematical background of this equivalent scheme is described. The determination of the different scheme elements is made through a finite-elements calculation of both main and leakage inductances, for the case of a four-winding transformer. A procedure is defined, which allows to estimate the values of these elements from some measurements on the transformer at no-load and short-circuit operations. A specific strategy of short-circuit tests is described, allowing to determine all parameters in a rather simple way.
In this paper we propose right-angled Artin groups as a platform for secret sharing schemes based on the efficiency (linear time) of the word problem. Inspired by previous work of Grigoriev-Shpilrain in the context of graphs, we define two new problems: Subgroup Isomorphism Problem and Group Homomorphism Problem. Based on them, we also propose two new authentication schemes. For right-angled Artin groups, the Group Homomorphism and Graph Homomorphism problems are equivalent, and the later is known to be NP-complete. In the case of the Subgroup Isomorphism problem, we bring some results due to Bridson who shows there are right-angled Artin groups in which this problem is unsolvable.
The concept of a hybrid scheme with connection of SIDH and ECDH is nowadays very popular. In hardware implementations it is convenient to use a classical key exchange algorithm, which is based on the same finite field as SIDH. Most frequently used hybrid scheme is SIDH-ECDH. On the other hand, using the same field as in SIDH, one can construct schemes over Fpn, like Diffie-Hellman or XTR scheme, whose security is based on the discrete logarithm problem. In this paper, idea of such schemes will be presented. The security of schemes, which are based on the discrete logarithm problem over fields Fp; Fp2 ; Fp4 ; Fp6 and Fp8 , for primes p used in SIDH, will be analyzed. At the end, the propositions of practical applications of these schemes will be presented.
Assumptions of the major political and legal documents of the European Union, dedicated to energy efficiency and energy performance of buildings provide the Member States with relevant instruments supporting improvement of the ambient air qualityby dissemination of measures reducing energy demand and promotion of renewable energysources. Mainstreaming EU legislation into national regulations constitutes initial stage of the long term process of supporting implementation of energy efficiency measures. Experience in the improvement of energy performance of the residential buildings revealslimited efficiency of the measures implemented up to date, which results in significantair pollution of Polish cities. The national Action Plans had adopted a limited scope of recommendations included in the EU directives, hence the process meets significant challenges.The article describes adaptation of the relevant EU directives as well as the National Urban Policy in terms of the potential to effectively address faced challenges.
In this paper we present a family of transforms that map existentially unforgeable signature schemes to signature schemes being strongly unforgeable. In spite of rising security, the transforms let us make a signature on a union of messages at once. The number of elements in this union depends on the signing algorithm of a scheme being transformed. In addition to that we define an existentially unforgeable signature scheme based on pairings, which satisfies all assumptions of the first part and is able to be subjected to transformation.
This paper deals with some aspects of formulation and implementation of a broadband algorithm with build-in analysis of some dispersive media. The construction of the finite element method (FEM) based on direct integration of Maxwell’s equations and solution of some additional convolution integrals is presented. The broadband, fractional model of permittivity is approximated by a set of some relaxation sub-models. The properties of the 3D time-dependent formulation of the FEM algorithm are determined using a benchmark problem with the Cole-Cole and the Davidson-Cole models. Several issues associated with the implementation and some constraints of the broadband finite element algorithm are presented.
This article investigates and evaluates a handover exchange scheme between two secondary users (SUs) moving in different directions across the handover region of neighboring cell in a cognitive radio network. More specifically, this investigation compares the performance of SUs in a cellular cognitive radio network with and without channel exchange scheme. The investigation shows reduced handover failure, blocking, forced and access probabilities respectively, for handover exchange scheme with buffer as compared to exchange scheme without buffer. It also shows transaction within two cognitive nodes within a network region. The system setup is evaluated through system simulation.
A robust Kalman filter improved with IGG (Institute of Geodesy and Geophysics) scheme is proposed and used to resist the harmful effect of gross error from GPS observation in PPP/INS (precise point positioning/inertial navigation system) tightly coupled positioning. A new robust filter factor is constructed as a three-section function to increase the computational efficiency based on the IGG principle. The results of simulation analysis show that the robust Kalman filter with IGG scheme is able to reduce the filter iteration number and increase efficiency. The effectiveness of new robust filter is demonstrated by a real experiment. The results support our conclusion that the improved robust Kalman filter with IGG scheme used in PPP/INS tightly coupled positioning is able to remove the ill effect of gross error in GPS pseudorange observation. It clearly illustrates that the improved robust Kalman filter is very effective, and all simulated gross errors added to GPS pseudorange observation are successfully detected and modified.
In this study, we propose a novel keyed hash algorithm based on a Boolean function and chaotic attractor. The hash algorithm called BentSign is based on two Signature attractors and XOR function and a bent Boolean function. The provided theoretical and experimental results confirm that the novel scheme can generate output hashes with a good level of security, collision resistance, and protection against most common attacks.