text stringlengths 30 4k | source stringlengths 60 201 |
|---|---|
MIT OpenCourseWare
http://ocw.mit.edu
6.641 Electromagnetic Fields, Forces, and Motion
Spring 2009
For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
6.641, Electromagnetic Fields, Forces, and Motion
Prof. Markus Zahn
Lecture 2: Differential Form of Maxwell’s Equati... | https://ocw.mit.edu/courses/6-641-electromagnetic-fields-forces-and-motion-spring-2009/1c014f0d8c71c1be1eb4fd3198b1d543_MIT6_641s09_lec02.pdf |
dV =
)
∫ ρ dV
S
V
V
∇ i ε0E = ρ
)
(
µ H i da = ∇ i µ H dV = 0
( 0 )
∫
V
0
S
(cid:118)∫
∇ i (
)
µ0H = 0
II. Stokes’ Theorem
1. Curl Operation
) i
A ds = ∫ Curl A
(
i
S
(cid:118)∫
C
da
(cid:118)∫
)n
Curl A = lim C
(
da
n →0
A ds
i
da
n
6.641, Electromagnetic Fields, Forces, and Motion
Prof. Mark... | https://ocw.mit.edu/courses/6-641-electromagnetic-fields-forces-and-motion-spring-2009/1c014f0d8c71c1be1eb4fd3198b1d543_MIT6_641s09_lec02.pdf |
(
) - A x, y
)⎤
⎤
⎦
⎥
⎥
⎦
∆x
= da z ⎢
⎡ ∂Ay
⎣ ∂x
-
∂Ax ⎤
⎥
∂y ⎦
)z
(
Curl A
= (cid:118)∫
i
A ds
=
da
z
A
∂
y -
x
∂
A
∂
x
y
∂
By symmetry
(
Curl A
) = (cid:118)∫ A ds
i
y
da
y
∂A
= x
∂z
-
∂A
z
∂x
Curl A = (cid:118)∫ A ds
=
i
(
)x
dax
∂Az -
∂y
∂Ay
∂z
Curl A = i x ⎢
− ⎡ ∂A
⎣ ∂y
z -
−
⎥ ... | https://ocw.mit.edu/courses/6-641-electromagnetic-fields-forces-and-motion-spring-2009/1c014f0d8c71c1be1eb4fd3198b1d543_MIT6_641s09_lec02.pdf |
3. Magnetic Field
∇ i ⎨∇ × E = - µ0
⎧
⎪
⎪
⎩
⎫
∂H⎪
⎬
∂t ⎪
⎭
0 = -
∂
t ⎣
∂
⎡∇ µ0
⎦ ⇒ ∇ i (µ0H) = 0
⎤
i H
6.641, Electromagnetic Fields, Forces, and Motion
Prof. Markus Zahn
Lecture 2
Page 8 of 10
4. Vector Identity
b
(
∫ i
E dl = Φ a
) − Φ ( ) b
a
if a=b
E dl
(cid:118)∫ i
C
= Φ ( )
a − Φ
(a) = 0
... | https://ocw.mit.edu/courses/6-641-electromagnetic-fields-forces-and-motion-spring-2009/1c014f0d8c71c1be1eb4fd3198b1d543_MIT6_641s09_lec02.pdf |
⎡
(
)
µ0 J x ', y ', z ' dx dy dz
+ (y − y ')2
'
'
⎣(x − x ')2
+ (z − z ')2 ⎤
⎦
'
1
2
6.641, Electromagnetic Fields, Forces, and Motion
Prof. Markus Zahn
Lecture 2
Page 10 of 10 | https://ocw.mit.edu/courses/6-641-electromagnetic-fields-forces-and-motion-spring-2009/1c014f0d8c71c1be1eb4fd3198b1d543_MIT6_641s09_lec02.pdf |
18.175: Lecture 5
More integration and expectation
Scott Sheffield
MIT
18.175 Lecture 5
1Outline
Integration
Expectation
18.175 Lecture 5
2Outline
Integration
Expectation
18.175 Lecture 5
3Recall Lebesgue integration
� Lebesgue: If you can measure, you can integrate.
� In more words: if (Ω, F) is a m... | https://ocw.mit.edu/courses/18-175-theory-of-probability-spring-2014/1c016821763783c34c48816b1ac66969_MIT18_175S14_Lecture5.pdf |
<
<
If g ≤ f a.s. then
< fdµ.
< gdµ ≤
If g = f a.e. then gdµ =
fdµ.
<
|
|f |dµ.
When (Ω, F, µ) = (Rd , Rd , λ), write
fdµ| ≤
<
(cid:73)
�
(cid:73)
�
<
fdµ + b gdµ.
<
f (x)dx = 1E fdλ.
<
E
18.175 Lecture 5
5Outline
Integration
Expectation
18.175 Lecture 5
6Outline
Integration
Expectation
18.175 L... | https://ocw.mit.edu/courses/18-175-theory-of-probability-spring-2014/1c016821763783c34c48816b1ac66969_MIT18_175S14_Lecture5.pdf |
functions.
<
|f |pdµ)1/p for
H¨older’s inequality: Write lf lp = (
<
|fg |dµ ≤ lf lplg lq.
1 ≤ p < ∞. If 1/p + 1/q = 1, then
Main idea of proof: Rescale so that lf lplg lq = 1. Use
some basic calculus to check that for any positive x and y we
have xy ≤ x p/p + y q/p. Write x = |f |, y = |g | and integrate
to... | https://ocw.mit.edu/courses/18-175-theory-of-probability-spring-2014/1c016821763783c34c48816b1ac66969_MIT18_175S14_Lecture5.pdf |
If fn ≥ 0 then
lim inf
n→∞
fndµ ≥
lim inf fn)dµ.
n→∞
(cid:73)
�
(Counterexample for opposite-direction inequality using thin
and tall rectangles?)
Main idea of proof: first reduce to case that the fn are
increasing by writing gn(x) = infm≥n fm(x) and observing that
gn(x) ↑ g (x) = lim infn→∞ fn(x). Then truncat... | https://ocw.mit.edu/courses/18-175-theory-of-probability-spring-2014/1c016821763783c34c48816b1ac66969_MIT18_175S14_Lecture5.pdf |
18.445 Introduction to Stochastic Processes
Lecture 10: Hitting times
Hao Wu
MIT
16 March 2015
Hao Wu (MIT)
18.445
16 March 2015
1 / 8
Recall
Consider a network (G = (V , E), {c(e) : e ∈ E}). The effective
resistance is defined by
R(a ↔ z) = (W (a) − W (z))/||I||.
Consider a random walk on the network, the Green’s func... | https://ocw.mit.edu/courses/18-445-introduction-to-stochastic-processes-spring-2015/1c4e0f0bf28f0ec9f0fd6bc8f7b896f1_MIT18_445S15_lecture10.pdf |
/ 8
Transitive Markov chain
Roughly, a transitive Markov chain “looks the same" from any point in
the state space.
Definition
A Markov chain is called transitive if for each pair (x, y ) ∈ Ω × Ω, there
is a bijection ϕ : Ω → Ω such that
ϕ(x) = y ; P(ϕ(z), ϕ(w)) = P(z, w), ∀z, w.
Example : simple random walk on N-cycle,... | https://ocw.mit.edu/courses/18-445-introduction-to-stochastic-processes-spring-2015/1c4e0f0bf28f0ec9f0fd6bc8f7b896f1_MIT18_445S15_lecture10.pdf |
V → V such that
ϕ(x) = y ;
c(ϕ(z), ϕ(w)) = c(z, w), ∀z, w.
Remark : The random walk on a transitive network is a transitive
Markov chain.
Theorem
For the random walk on a transitive (connected) network, for any
vertices a and b, we have
Ea[τb] = Eb[τa].
Hao Wu (MIT)
18.445
16 March 2015
7 / 8
Summary
For random walk o... | https://ocw.mit.edu/courses/18-445-introduction-to-stochastic-processes-spring-2015/1c4e0f0bf28f0ec9f0fd6bc8f7b896f1_MIT18_445S15_lecture10.pdf |
Utility Theory
Week 4 Framing
Required Reading:
de Neufville, Richard, Applied Systems Analysis: Engineering Planning and Technology
Management, McGraw-Hill, New York, 1990. Chapters 18, 19, 20, 21.
McManus, H. L., and Ross, A. M., SSPARC Book Material for Lecture 4.
Gumbert, C. C., Violet, M. D., Hastings, D. E.... | https://ocw.mit.edu/courses/16-892j-space-system-architecture-and-design-fall-2004/1c5ef3f7a6f50076b2608123521822a9_04000lec4outlnv3.pdf |
onautics, Massachusetts Institute of Technology,
May 2001. (excerpt covering determination of utilities)
Spaulding, Timothy J., “Tools for Evolutionary Acquisition: A Study of Multi-Attributes
Tradespace Exploartion (MATE) Applied to the Space Based Radar (SBR), Master of
Science Thesis in Aeronautics and Astronaut... | https://ocw.mit.edu/courses/16-892j-space-system-architecture-and-design-fall-2004/1c5ef3f7a6f50076b2608123521822a9_04000lec4outlnv3.pdf |
1.4 Backward Kolmogorov equation
When mutations are less likely, genetic drift dominates and the steady state distributions are
peaked at x = 0 and 1. In the limit of µ1 = 0 (or µ2 = 0), Eq. (1.63) no longer corresponds
to a well-defined probability distribution, as the 1/x (or 1/(1 − x)) divergence close to x = 0
(or x... | https://ocw.mit.edu/courses/8-592j-statistical-physics-in-biology-spring-2011/1c5ef58df27b3a6ae906ba0d5aaba9ed_MIT8_592JS11_lec5.pdf |
the next
following the transition rates, but irrespective of its previous history. This type of process
with no memory is called Markovian, after the Russian mathematician Andrey Andreyevich
Markov (1856-1922). We can use this probability to construct evolution equations for the
probability by focusing on the change of... | https://ocw.mit.edu/courses/8-592j-statistical-physics-in-biology-spring-2011/1c5ef58df27b3a6ae906ba0d5aaba9ed_MIT8_592JS11_lec5.pdf |
1
2
(cid:18)Z
(cid:19)
15
Z
∂p(x, t|y)
∂y
(cid:19)
∂2p(x, t|y)
∂y2
+ · · · .
(1.66)
Using the normalization condition for R(δy, y) and the definitions of drift and diffusion
coefficients from Eqs. (1.36) and (1.37), we obtain
∂p(x, t|y)
∂t
= v(y)
∂p
∂y
+ D(y)
∂2p
∂y2 ,
(1.67)
which is known as the backward Kolmogorov equa... | https://ocw.mit.edu/courses/8-592j-statistical-physics-in-biology-spring-2011/1c5ef58df27b3a6ae906ba0d5aaba9ed_MIT8_592JS11_lec5.pdf |
)
Z
= − ln (D(y)p∗(y)) .
(1.70)
The result of the above integration is related to an intermediate step in calculation of the
steady state solution p∗ of the forward Kolmogorov equation in (1.59). However, as we
noted already, in the context of absorbing states the function p∗ is not normalizable and
thus cannot be rega... | https://ocw.mit.edu/courses/8-592j-statistical-physics-in-biology-spring-2011/1c5ef58df27b3a6ae906ba0d5aaba9ed_MIT8_592JS11_lec5.pdf |
if 2sN ≪ 1). If it is advantageous (2sN ≫ 1) it will be fixed with
probability Π1 = 1 − e−s irrespective of the population size! If it is deleterious (2sN ≪ −1)
it will have a very hard time getting fixed, with a probability that decays with population
size as Π1 = e−(2N −1)|s|. The probability of loss of the mutation is... | https://ocw.mit.edu/courses/8-592j-statistical-physics-in-biology-spring-2011/1c5ef58df27b3a6ae906ba0d5aaba9ed_MIT8_592JS11_lec5.pdf |
mean fixation time is now computed from
hτ (y)ia =
∞
0
Z
dt t pa(t|y) =
1
Π∗(xa, y)
0
Z
∞
dt t
∂p(xa, t|y)
∂t
.
(1.74)
(1.75)
Following Kimura and Ohta (1968)3, we first examine the numerator of the above ex-
pression, defined as
(Writing limT →∞
equation by parts to get
T
0 rather than simply
R
0
Z
∞
0
Ta(y) = lim
T →∞
T... | https://ocw.mit.edu/courses/8-592j-statistical-physics-in-biology-spring-2011/1c5ef58df27b3a6ae906ba0d5aaba9ed_MIT8_592JS11_lec5.pdf |
.67). Integrating the latter over time leads to
ByTa(y) = −p(xa, ∞|y) = −Π∗(xa, y) .
(1.80)
For example,
let us consider a population with no selection (s = 0), for which the
probability to lose a mutation is Π0 = (1 − y). In this case, Eq. (1.80) reduces to
y(1 − y)
4N
∂2T0
∂y2 = −(1 − y) ⇒
∂2T0
∂y2 = −
4N
y
.
(1.81)
... | https://ocw.mit.edu/courses/8-592j-statistical-physics-in-biology-spring-2011/1c5ef58df27b3a6ae906ba0d5aaba9ed_MIT8_592JS11_lec5.pdf |
the mutation survives in the population.
The net probability that the mutation is still present at time t is
1−
S(t|y) =
dxp(x, t|y) ,
0+
Z
(1.85)
where the integrations exclude the absorbing points at 0 and 1. Conversely, the PDF that
the mutation disappears (by loss or fixation) at time t is
p×(t|y) = −
dS(t|y)
dt
= −... | https://ocw.mit.edu/courses/8-592j-statistical-physics-in-biology-spring-2011/1c5ef58df27b3a6ae906ba0d5aaba9ed_MIT8_592JS11_lec5.pdf |
MIT OpenCourseWare
http://ocw.mit.edu
ESD.70J / 1.145J Engineering Economy Module
Fall 2009
For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
ESD.70J Engineering Economy
Fall 2009
Session Two
Michel-Alexandre Cardin
Prof. Richard de Neufville
ESD.70J Engineering Eco... | https://ocw.mit.edu/courses/esd-70j-engineering-economy-module-fall-2009/1c610901c86e62fbe5cc1e555297b7ed_MITESD_70Jf09_lec02.pdf |
C4 and C5
ESD.70J Engineering Economy Module - Session 2
5
Random number generator
Follow the instructions, step by step
1. Go to tab “RAND”
2. Type “=Entries!C9*((1-
Entries!C25)+2*Entries!C25*RAND())” in cell C3
3. Type “=Entries!C10*((1-
Entries!C25)+2*Entries!C25*RAND())” in cell D3
4. Type “=Entries!C11*((1-
Entr... | https://ocw.mit.edu/courses/esd-70j-engineering-economy-module-fall-2009/1c610901c86e62fbe5cc1e555297b7ed_MITESD_70Jf09_lec02.pdf |
.70J Engineering Economy Module - Session 2
9
Monte Carlo Simulation
Generate many sets of random price for the
three-phase span
Calculate corresponding NPVs
Generate Distribution of NPVs
Statistical Analysis
ESD.70J Engineering Economy Module - Session 2
10
Setup simulation by Data Table
Follow these instructions, s... | https://ocw.mit.edu/courses/esd-70j-engineering-economy-module-fall-2009/1c610901c86e62fbe5cc1e555297b7ed_MITESD_70Jf09_lec02.pdf |
color
ESD.70J Engineering Economy Module - Session 2
13
Give it a try!
Check with your neighbors…
Check the solution sheet…
Ask me questions…
ESD.70J Engineering Economy Module - Session 2
14
Calculating descriptive statistics
• Useful to know mean, maximum, and
minimum values for the simulated
results
Follow step ... | https://ocw.mit.edu/courses/esd-70j-engineering-economy-module-fall-2009/1c610901c86e62fbe5cc1e555297b7ed_MITESD_70Jf09_lec02.pdf |
0*F7”, and drag the formula down to G27
2. Set Cell H7
“=COUNTIF($B$9:$B$2008,"<="&G7)”, and drag
the formula down to H27
3. Set Cell I7 “=H7/2000”, and drag down to cell I27
4. Same is already done for Plan B
ESD.70J Engineering Economy Module - Session 2
19
Target curve
6. Right-click the chart on the right, selec... | https://ocw.mit.edu/courses/esd-70j-engineering-economy-module-fall-2009/1c610901c86e62fbe5cc1e555297b7ed_MITESD_70Jf09_lec02.pdf |
managers
and decision-makers!
ESD.70J Engineering Economy Module - Session 2
22
Question
• Why are high NPV values more cut off
for Plan B on the target curve and
histogram than for Plan A?
– A matter of constraints…
ESD.70J Engineering Economy Module - Session 2
23
Give it a try!
Check with your neighbors…
Check ... | https://ocw.mit.edu/courses/esd-70j-engineering-economy-module-fall-2009/1c610901c86e62fbe5cc1e555297b7ed_MITESD_70Jf09_lec02.pdf |
Turbulent Flow and Transport
4
Free Shear Flows I: Jets, Wakes, etc.−Solutions Based on
Simple Mean−Flow Closure Schemes
4.1 Mean−flow closure schemes for free shear flows.
4.2
4.3
4.4
for
4.5
Spreading of a velocity discontinuity with downstream distance in steady flow.
The nature of the laminar flow soluti... | https://ocw.mit.edu/courses/2-27-turbulent-flow-and-transport-spring-2002/1c80d3bfd54cb73fffc3a301657e8cfb_Free_shear_flows.pdf |
Mech., 74 (1976): 209−250.
Further reading:
Hinze. Chapter 6.
Abramovich. The Theory of Turbulent Jets:103−113, 120−125.
Rajaratnam. "Turbulent Jets." Elsevier, 1976.
Rodi. In "Studies in Convection" B. E. Launder. ed. Academic
Press, 1975: 79 ff.
Townsend. Chap.6 in The Structure of Turbulent Shear Flow. 2nd ed.... | https://ocw.mit.edu/courses/2-27-turbulent-flow-and-transport-spring-2002/1c80d3bfd54cb73fffc3a301657e8cfb_Free_shear_flows.pdf |
Introduction to Engineering
Introduction to Engineering
Systems, ESD.00
Lecture 6
Lecturers:
Professor Joseph Sussman
Dr Afreen Siddiqi
Dr. Afreen Siddiqi
TA: Regina Clewlow
Uncertainty Lecture 2 Outline
Uncertainty Lecture 2-- Outline
Global Climate Change
High-impact, Low-probability events
Decision-making Und... | https://ocw.mit.edu/courses/esd-00-introduction-to-engineering-systems-spring-2011/1cb961bffd1d5e437be957c66ad547fd_MITESD_00S11_lec06.pdf |
ertainty: High-impact, Low
Probability Events
Probability Events
Ripped from the headlines
The Japan earthquake and tsunamis
5th biggest earthquake in recorded history,
biggest ever in Japan
biggest ever in Japan
Huge loss of life, injuries, property damage
Japan likely the most prepared nation in the
th
k di
wo... | https://ocw.mit.edu/courses/esd-00-introduction-to-engineering-systems-spring-2011/1cb961bffd1d5e437be957c66ad547fd_MITESD_00S11_lec06.pdf |
Uncertainty: Annuities
Annuities
Buy an annuity for $X
You get $Y/ year for the rest of your life….
Why it is a [good, bad] deal for you?
Whyy it is a [g[g
you’re the annuity?
ood, bad]] deal for the comppanyy that sold
What might you do instead of buying an annuity?
What might you do instead of buying an annuity?
... | https://ocw.mit.edu/courses/esd-00-introduction-to-engineering-systems-spring-2011/1cb961bffd1d5e437be957c66ad547fd_MITESD_00S11_lec06.pdf |
=
All M
Uncertainty: Bayes Theorem
Uncertainty: Bayes Theorem
’
Bayes’ Theorem
Conditional probabilities
P(event A happens)= [P(event A/given B occurs) for all
P(event A happens)= [P(event A/given B occurs) for all
possible outcomes of B] * P( each possible outcome of
B)]
Uncertainty: Bayes Theorem
Uncertainty... | https://ocw.mit.edu/courses/esd-00-introduction-to-engineering-systems-spring-2011/1cb961bffd1d5e437be957c66ad547fd_MITESD_00S11_lec06.pdf |
D.00 Introduction to Engineering Systems
SSpriing 20112011
For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. | https://ocw.mit.edu/courses/esd-00-introduction-to-engineering-systems-spring-2011/1cb961bffd1d5e437be957c66ad547fd_MITESD_00S11_lec06.pdf |
MIT OpenCourseWare
http://ocw.mit.edu
6.080 / 6.089 Great Ideas in Theoretical Computer Science
Spring 2008
For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
6.080/6.089 GITCS
Mar 11, 2008
Lecturer: Scott Aaronson
Scribe: Yinmeng Zhang
Lecture 10
1 Administriv... | https://ocw.mit.edu/courses/6-080-great-ideas-in-theoretical-computer-science-spring-2008/1cce8117881c1d1e5a21935bdf76d377_lec10.pdf |
SATISFIABILITY (or SAT for short). We saw Cook and Levin’s proof that SAT is NP-complete
by reduction from DUH. Today we will see some more reductions.
10-1
PNPNP-completeNP-hard3 SAT reduces to 3SAT
Though SAT is NP-complete, specific instances of it can be easy to solve.
Some useful terminology: a clause is a sin... | https://ocw.mit.edu/courses/6-080-great-ideas-in-theoretical-computer-science-spring-2008/1cce8117881c1d1e5a21935bdf76d377_lec10.pdf |
straightforward – every
in the formula becomes a NOT, AND, or OR gate in the circuit. One detail we need to take care
of is that when we say multiple literals ∧ed or ∨ed together, we first need to specify an order in
which to take the ∧s or ∨s. For example, if we saw (x1 ∨ x2 ∨ x3) in our formula, we should parse
it... | https://ocw.mit.edu/courses/6-080-great-ideas-in-theoretical-computer-science-spring-2008/1cce8117881c1d1e5a21935bdf76d377_lec10.pdf |
two inputs and one output for AND
and OR, and one input and one output for NOT. Let’s define a variable for every gate. We want
to know if there is a setting of these variables such that for every gate, the output has the right
relationship to the input/inputs, and the final output is set to true.
So let’s look at th... | https://ocw.mit.edu/courses/6-080-great-ideas-in-theoretical-computer-science-spring-2008/1cce8117881c1d1e5a21935bdf76d377_lec10.pdf |
And similarly for the AND gate. The big idea here is that we’re taking small pieces of a problem
we know to be hard (gates in a circuit) and translating them into small pieces of a problem we’re
trying to show is hard (CNF formulas). These small pieces are called “gadgets”, and they’re a
recurring theme in reduction... | https://ocw.mit.edu/courses/6-080-great-ideas-in-theoretical-computer-science-spring-2008/1cce8117881c1d1e5a21935bdf76d377_lec10.pdf |
triangle. So for a given good 3-coloring, whatever color the first vertex gets assigned,
we’re going to call True; the second is going to be False; and the third is going to be Neither.
Here is a gadget for the NOT gate.
Because x and ¬x are connected to each other, any good coloring will assign them different
colors... | https://ocw.mit.edu/courses/6-080-great-ideas-in-theoretical-computer-science-spring-2008/1cce8117881c1d1e5a21935bdf76d377_lec10.pdf |
, we can turn any circuit into a graph so that assignment of T/Fs
to the wires translates to colorings of the graph. If we then connect the final output vertex to the
False vertex in the palette, then the graph we’ve constructed will have a good 3-coloring iff the
circuit had a satisfying assignment.
So we’ve just pr... | https://ocw.mit.edu/courses/6-080-great-ideas-in-theoretical-computer-science-spring-2008/1cce8117881c1d1e5a21935bdf76d377_lec10.pdf |
∧y132a2b5
In conclusion
In 1972, Karp showed 21 problems were NP-complete using the above techniques and a good dose
of cleverness. We could spend a month looking at clever gadgets, but we’re not going to. The
takeaway lesson is that NP-completeness is ubiquitous. Today, thousands of practical problems
have been ... | https://ocw.mit.edu/courses/6-080-great-ideas-in-theoretical-computer-science-spring-2008/1cce8117881c1d1e5a21935bdf76d377_lec10.pdf |
will be solvable efficiently, and every problem in
NP will be NP-complete: the computational universe will look pretty monotonous. If P=� NP,
then what do we know? All the problems in P will be easy, and all NP-complete problems will
be hard. Would there be anything in between? Would there be problems in NP which are ... | https://ocw.mit.edu/courses/6-080-great-ideas-in-theoretical-computer-science-spring-2008/1cce8117881c1d1e5a21935bdf76d377_lec10.pdf |
14. Instability of Superposed Fluids
Figure 14.1: Wind over water: A layer of fluid of density ρ+ moving with relative velocity V over a layer
of fluid of density ρ− .
Define interface: h(x, y, z) = z
The unit normal is given by
−
η(x, y) = 0 so that ∇h = (
ηx,
−
ηy, 1).
nˆ =
∇h
∇h
|
|
=
−
ηy, 1)
1/2
ηx,
(
−
... | https://ocw.mit.edu/courses/18-357-interfacial-phenomena-fall-2010/1d1f0dbdfd935d542ea0242a4649fada_MIT18_357F10_Lecture14.pdf |
±
∂y
yˆ +
∂φ±
∂z
zˆ
from which
∂η
∂t
=
1
V +
2
∂φ±
∂x
)
(
−
(
∓
ηx) +
∂φ±
(
∂y
−
ηy) +
∂φ±
∂z
(14.1)
(14.2)
(14.3)
(14.4)
Linearize: assume perturbation fields η, φ± and their derivatives are small and therefore can neglect
their products.
Thus ηˆ
ηy, 1) and ∂η =
ηx,
(
1 V ηx +
2
∂φ±
∂z
∂t... | https://ocw.mit.edu/courses/18-357-interfacial-phenomena-fall-2010/1d1f0dbdfd935d542ea0242a4649fada_MIT18_357F10_Lecture14.pdf |
1
+ ρ±
2
V
(
∓
∂φ±
∂x
)
+ p± + ρ±gη = G(t)
(14.7)
so
p−
−
p+ = (ρ+
−
ρ−)gη + (ρ+
∂φ±
∂t
−
ρ−
∂φ−
∂t
) +
V
2
(ρ−
∂φ−
∂x
+ ρ+
∂φ+
∂x
) =
−
σ(ηxx + ηyy)
(14.8)
is the linearized normal stress BC. Seek normal mode (wave) solutions of the form
η = η0e
iαx+iβy+ωt
φ± = φ0±e
∓kz iαx+iβy+ωt
e ... | https://ocw.mit.edu/courses/18-357-interfacial-phenomena-fall-2010/1d1f0dbdfd935d542ea0242a4649fada_MIT18_357F10_Lecture14.pdf |
= ω ρ+(ω
[
1
2
−
iαV ) + ρ−(ω +
1
2
iαV ) + gk(ρ−
]
ρ+) +
−
1
2
iαV ρ+(ω
[
−
1
2
iαV ) + ρ−(ω +
1
2
iαV )
]
−
so
ω2 + iαV
ρ−
ρ+
−
ρ− + ρ+
(
ω
)
−
1
α2V + k2C0
2
4
2 = 0
where C 2
k.
0
Dispersion relation: we now have the relation between ω and k
σ
ρ−+ρ+
ρ−−ρ+
ρ−+ρ+
+
≡
g
k
(
)
ω =
1
2
i
... | https://ocw.mit.edu/courses/18-357-interfacial-phenomena-fall-2010/1d1f0dbdfd935d542ea0242a4649fada_MIT18_357F10_Lecture14.pdf |
We proceed by considering two important special cases, Rayleigh-Taylor and Kelvin-Helmholtz instability.
MIT OCW: 18.357 Interfacial Phenomena
56
Prof. John W. M. Bush
14.1. Rayleigh-Taylor Instability
Chapter 14. Instability of Superposed Fluids
14.1 Rayleigh-Taylor Inst... | https://ocw.mit.edu/courses/18-357-interfacial-phenomena-fall-2010/1d1f0dbdfd935d542ea0242a4649fada_MIT18_357F10_Lecture14.pdf |
= ΔES + ΔEG < 0, i.e. when ρg > σk2 ,
so λ > 2πlc.
The system is thus unstable to long λ.
Note:
h2 dx =
)
−
−
0
Figure 14.2: The base state and the per-
turbed state of the Rayleigh-Taylor system,
heavy fluid over light.
1. The system is stabilized to small λ disturbances by
σ
2. The system is always unstable for su... | https://ocw.mit.edu/courses/18-357-interfacial-phenomena-fall-2010/1d1f0dbdfd935d542ea0242a4649fada_MIT18_357F10_Lecture14.pdf |
gravitationally stable, but destabilized by the shear.
Take k parallel
instability
(V · k)
to V ,
k2V
and
the
so
=
2
2
ρ+ so the
≥
criterion becomes:
2
ρ−ρ+V > (ρ−
ρ+)
−
g
k
+ σk
(14.17)
Equivalently,
2
ρ−ρ+V > (ρ−
ρ+) g
−
λ
2π
+ σ
2π
λ
(14.18)
Note:
1. System stabilized to short λ disturban... | https://ocw.mit.edu/courses/18-357-interfacial-phenomena-fall-2010/1d1f0dbdfd935d542ea0242a4649fada_MIT18_357F10_Lecture14.pdf |
the min
Figure 14.5: Fluid speed V (k) required for
the growth of a wave with wavenumber k.
√
103
2
1.2·10−3
E.g. Air blowing over water: (cgs)
2
Vc ∼
V =
1
c
·
mum wind speed required to generate waves.
These waves have wavenumber kc =
waves.
1·103
70
70
J
⇒
·
≈
650cm/s is the mini-
3.8 cm , so λc = ... | https://ocw.mit.edu/courses/18-357-interfacial-phenomena-fall-2010/1d1f0dbdfd935d542ea0242a4649fada_MIT18_357F10_Lecture14.pdf |
6.897: Selected Topics in Cryptography
Lecturer: Ran Canetti
Lectures 3 and 4:
ZK as function evaluation and
sequential composition of ZK
• Review the definition of ZK and PoK
• Give SFE-style definition of ZK and show
equivalence to the standard one.
• The Blum protocol for Hamiltonicity:
– Commitment schemes
– ... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/1d52d1e1de07e4fd8cf3ea9e3f689583_lecture3_4.pdf |
(x,0). (But this is easy to achieve, by
having P send (x,”reject”) to V.)
Review: Zero-Knowledge
[Goldwasser-Micali-Rackoff 85]
• Zero-Knowledge:
For any verifier V* there exists a machine S
such that for all x,w,z, S(x,R(x,w),z) ≈ V*
P(x,w)(z).
“Whatever V* can gather from interacting with P, it could have
comp... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/1d52d1e1de07e4fd8cf3ea9e3f689583_lecture3_4.pdf |
in the spirit of the “enhanced PoK” of [Lindell 03].)
ZK PoK as an SFE task
Let R(x,w) be a binary relation.
Consider the 2-party function:
F
R ((x,w), - , - ) = ( - , (x,R(x,w)) , (x,R(x,w)))
zk
Theorem: A two-party protocol securely
R (with respect to
realizes Fzk
non-adaptive adversaries) if and only if
it is ... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/1d52d1e1de07e4fd8cf3ea9e3f689583_lecture3_4.pdf |
um protocol
Common relation:
HC(G,H)=1 if H is a Hamiltonian cycle in graph G.
Common input: k-node graph G
Secret witness for P: Hamiltonian cycle H in G.
• P(G,H): If HC(G,H)=0 then send (G,”reject”) to V. Else, choose a
random permutation p on [1..k] and send (G, C(p(G)), C(p)) to V.
• V: If received (G,”reject... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/1d52d1e1de07e4fd8cf3ea9e3f689583_lecture3_4.pdf |
½. Let R(x,y) be a binary relation. Recall:
Fzk
R ((x,w), -,- ) = ( - ,(x,R(x,w)),(x,R(x,w)))
• Define:
Fwzk
R ((x,w), -,c) = If R(x,w)=1 then output (-,(,x,1),(x,1).
Else, if c=“no cheat” output (,(,x,0),(x,0)).
If c=“cheat” output (,(,x,b),(x,b)) for bÅ R {0,1}.
H
Claim: The basic Blum protocol securely realize... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/1d52d1e1de07e4fd8cf3ea9e3f689583_lecture3_4.pdf |
value to F and on output:
•
•
•
If all decommitments succeed, then construct the Hamilt. Cycle. (if
fail then some commitment was broken). Then give (G,H) to the
TP (as the prover), and hand Z the output of A from either the first
or the second run (chosen at random).
If all decomm. for one value of b succeed, t... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/1d52d1e1de07e4fd8cf3ea9e3f689583_lecture3_4.pdf |
that S does not know.)
From Fwzk
R to Fzk
R
A protocol for realizing Fzk
• P(x,w): Run k copies of Fwzk
R in the Fwzk
R -hybrid model:
R , sequentially. Send
(x,w) to each copy.
• V: Run k copies of Fwzk
R , sequentially. Receive
i
(x ,b ) from the i-th copy. Then:
– If all x’s are the same and all b’s are the... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/1d52d1e1de07e4fd8cf3ea9e3f689583_lecture3_4.pdf |
,w) to to Fzk
R
Else S gives (x0 ,w0) (the default value) to Fzk .
i
R . (If didn’t find such w then
R , where w is an invalid witness.
i
i
i
–
Finally, S outputs whatever A outputs.
Analysis of S:
– When the verifier is corrupted, the views of Z from both interactions
are identically distributed.
– When the pr... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/1d52d1e1de07e4fd8cf3ea9e3f689583_lecture3_4.pdf |
)),C(p1)…C(pk(G)),C(pk)
VÆP: D(b1...bk)
PÆV: D(p1(G)),D(p1)…D(pk(G)),D(pk)
V: accept if all copies accept.
Parallel composition of Blum’s protocol
This solves the ZK problem. But now soundness fails:
Assume P,V use the same commitment C, and C is “malleable”,
say given C(b) can generate C(1-b) Then, P* can:
• Recei... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/1d52d1e1de07e4fd8cf3ea9e3f689583_lecture3_4.pdf |
Lecture 9
8.321 Quantum Theory I, Fall 2017
48
Lecture 9 (Oct. 4, 2017)
9.1 Spin- 1
2 in an AC Field
Consider a spin- 1 system in a time-dependent magnetic field. The Hamiltonian is
2
H = −
ge
2
m
S
· B(t .
)
(9.1)
We will consider a particular class of time-dependent magnetic fields, which we can write in the
form
B(t) ... | https://ocw.mit.edu/courses/8-321-quantum-theory-i-fall-2017/1d8cd3d97c8c26f16bea95051466574c_MIT8_321F17_lec9.pdf |
(ωt)xˆ + sin(ωt)yˆ) .
⊥
ω =
0
(cid:12)
(cid:12)
(cid:12)
(cid:12)
geB
0
2m
(cid:12)
(cid:12)
(cid:12)
(cid:12)
,
H0 = ω0Sz
.
(9.4)
(9.5)
(9.6)
(9.7)
(9.8)
(Note that we are taking e < 0 so that the signs work out here.) The time-evolution operator due
to this part of the Hamiltonian is
(cid:126)
U0(t) = e−iH0t/ .
The e... | https://ocw.mit.edu/courses/8-321-quantum-theory-i-fall-2017/1d8cd3d97c8c26f16bea95051466574c_MIT8_321F17_lec9.pdf |
)
cos
φ
2
− iσz sin
(cid:19)
φ
2
(cid:18)
cos
= S+
− iσz sin
(cid:19)
φ 2
φ
2
2
= S+(cos φ
− iσz sin φ)
= S+eiφ .
(9.13)
Here, in the first line we have expanded the exponentials, using the fact that the Pauli matrices
square to the identity. In the second line, we have used the fact that σz anticommutes with both
σx an... | https://ocw.mit.edu/courses/8-321-quantum-theory-i-fall-2017/1d8cd3d97c8c26f16bea95051466574c_MIT8_321F17_lec9.pdf |
(9.16) simplifies to
which is time-independent. The interaction picture time-evolution operator is then
VI = −
geB1
4m
(cid:0)S+ + S−(cid:1) = −
geB1 Sx ,
4m
UI(t) = ei
geB
2m(cid:126)
1 Sxt
.
(9.17)
(9.18)
This operator rotates states about the x-axis of spin space by an angle
rotation,
geB
2m(cid:126)
1 t. The frequen... | https://ocw.mit.edu/courses/8-321-quantum-theory-i-fall-2017/1d8cd3d97c8c26f16bea95051466574c_MIT8_321F17_lec9.pdf |
Rabi frequency.
Imagine that we start in a spin-up state, i.e.,
|ψI(0)(cid:105) →
(cid:19)
(cid:18)
1
0
,
(9.23)
where the arrow indicates that we are representing the state as a vector. At time t, we then have
(cid:18)1
0
(cid:19)
|ψI(t)(cid:105) → e−iωRtσx/2
(cid:19)
(cid:19)
− iσx sin
(cid:18) ωRt
2
(cid:1)
(cid:1) ... | https://ocw.mit.edu/courses/8-321-quantum-theory-i-fall-2017/1d8cd3d97c8c26f16bea95051466574c_MIT8_321F17_lec9.pdf |
Resonant Drive
Up until now, we have been working in the case of resonant drive. What happens if we’re off
resonance, i.e., ω (cid:54)= −ω0? In this case, even though we went to the interaction picture, we still
have a time-dependent Hamiltonian that we don’t know how to solve, because VI(t) is still time-
dependent. It... | https://ocw.mit.edu/courses/8-321-quantum-theory-i-fall-2017/1d8cd3d97c8c26f16bea95051466574c_MIT8_321F17_lec9.pdf |
9.30)
first term in brackets is unaffected by the time evolution, because Sz commutes with the
The
exponentials outside the brackets. The second term in brackets, along with the time-evolution
exponentials, looks exactly like the calculation we did in Eq. (9.16), but with the frequencies in all
of the exponentials exactl... | https://ocw.mit.edu/courses/8-321-quantum-theory-i-fall-2017/1d8cd3d97c8c26f16bea95051466574c_MIT8_321F17_lec9.pdf |
, t) =
(cid:88)
(cid:126)
e−iEa(cid:48) (t−t0)/ ca(cid:48)(t0)ua(cid:48)(x) .
a(cid:48)
∞
ˆ
−∞
ψ(x, t) =
ddx(cid:48) K(cid:0)x, t; x(cid:48), t0
(cid:1)ψ(cid:0)x(cid:48), t0
(cid:1) ,
with
K(cid:0)x, t; x(cid:48), t0
(cid:1) =
(cid:88)(cid:10)x(cid:12)
(cid:12)
(cid:12)
a(cid:48)(cid:11)e−iEa(cid:48) (t−t0)/ (cid:10)a(... | https://ocw.mit.edu/courses/8-321-quantum-theory-i-fall-2017/1d8cd3d97c8c26f16bea95051466574c_MIT8_321F17_lec9.pdf |
Engineering Risk Benefit Analysis
1.155, 2.943, 3.577, 6.938, 10.816, 13.621, 16.862, 22.82, ESD.72
CBA 3.
Bases for Comparison of Alternatives
George E. Apostolakis
Massachusetts Institute of Technology
Spring 2007
CBA 3. Bases for Comparison of Alternatives
1
Overview
•(Net) Present Worth or Value [(N)PW or
(N)PV] ... | https://ocw.mit.edu/courses/esd-72-engineering-risk-benefit-analysis-spring-2007/1ddaa9c180aa7db04223045ffdc70817_cba3.pdf |
CBA 3. Bases for Comparison of Alternatives
4
Present Worth: Example
• You buy a car and you put down $5,000. Your payments
will be $500 per month for 3 years at a nominal interest rate
of 10%. Assuming monthly compounding, what is the
present price you are paying?
From CBA 2, Slide 14, we get
)n,i,A/P(
=
(1
+
i)
... | https://ocw.mit.edu/courses/esd-72-engineering-risk-benefit-analysis-spring-2007/1ddaa9c180aa7db04223045ffdc70817_cba3.pdf |
Ak
if
if
PW(i)Aj > PW(i)Ak
AE(i)Aj > AE(i)Ak
• These criteria are using the total investment.
CBA 3. Bases for Comparison of Alternatives
7
Example of Total Investment Comparisons
End of Year
0
1
2
3
B3
-$12,000
-1,200
-1,200
1,500
B4
-$15,000
-400
-400
3,000
• The benefits from these alternatives are
identical. We... | https://ocw.mit.edu/courses/esd-72-engineering-risk-benefit-analysis-spring-2007/1ddaa9c180aa7db04223045ffdc70817_cba3.pdf |
,1
200
+
,2
700
1.0
3
1.1
=
1
−
−=
,1
200
+
,2
302.0x700
,5$
209
10(AE
%)
−=
,15
000
402.0x
−
400
+
,3
400
.0x
302
=
−=
,5$
403
,5$
209
4B
−<
Thus, B3 should be preferred over B4, just as before.
CBA 3. Bases for Comparison of Alternatives
10
Impact of Inflation (1)
• Suppose that the inflation rate is 9% and that the... | https://ocw.mit.edu/courses/esd-72-engineering-risk-benefit-analysis-spring-2007/1ddaa9c180aa7db04223045ffdc70817_cba3.pdf |
1.1
%)
4B
+
,1
943
3
1.1
=
• Therefore, B4 is now preferred, while, in the case
without inflation, B3 was preferred (slide 9).
CBA 3. Bases for Comparison of Alternatives
12
PW and AE on Incremental Investment
• Derive the difference between the two alternatives.
Year
0
1
2
3
B3
-$12,000
-1,200
-1,200
1,500
B4
-$15,... | https://ocw.mit.edu/courses/esd-72-engineering-risk-benefit-analysis-spring-2007/1ddaa9c180aa7db04223045ffdc70817_cba3.pdf |
*
)i1(F
+
t
−
t
• The IRR represents the percentage or rate earned on the
unrecovered balance of an investment such that the
payment schedule makes the unrecovered investment equal
to zero at the end of investment life.
CBA 3. Bases for Comparison of Alternatives
15
End of year t
0
1
2
3
4
5
Example
Ft
-1,000
-800
... | https://ocw.mit.edu/courses/esd-72-engineering-risk-benefit-analysis-spring-2007/1ddaa9c180aa7db04223045ffdc70817_cba3.pdf |
sequence F0, F1, F2, …, Fn, has one change in
sign only.
3. PW(0) > 0 (sum of all receipts > sum of all
disbursements)
CBA 3. Bases for Comparison of Alternatives
19
Examples
• Both B3 and B4 of slide 8 fail the third condition.
For B3, PW(0) = -$12,900 <0.
• For the cash flow on slide 16, PW(0) = 900 > 0.
• Consid... | https://ocw.mit.edu/courses/esd-72-engineering-risk-benefit-analysis-spring-2007/1ddaa9c180aa7db04223045ffdc70817_cba3.pdf |
ases for Comparison of Alternatives
22
IRR on Incremental Investment
1. Make sure the cash flows satisfy the conditions on
slide 19.
2. List alternatives in ascending order based on
initial cost.
3. The “current best” alternative can be the “Do
Nothing” one.
4. Determine the differences between the
“challenging” a... | https://ocw.mit.edu/courses/esd-72-engineering-risk-benefit-analysis-spring-2007/1ddaa9c180aa7db04223045ffdc70817_cba3.pdf |
)x1(x
+
21
21
i
*
A
2
≡−
A
1
x
21
=
%15%5.10
<
Therefore, A1 remains the current best alternative.
CBA 3. Bases for Comparison of Alternatives
26
$12,000
$10,000
$8,000
$6,000
$4,000
$2,000
$0
0
($2,000)
($4,000)
Example (4)
A1 A2 A2-A1
0.1987
0.2499
0.1
0.2
0.3
0.4
0.5
0.1056
CBA 3. Bases for Comparison of Alternativ... | https://ocw.mit.edu/courses/esd-72-engineering-risk-benefit-analysis-spring-2007/1ddaa9c180aa7db04223045ffdc70817_cba3.pdf |
6,000
$4,000
$2,000
$0
0
($2,000)
($4,000)
($6,000)
IRR on Total Investment (1)
• We can calculate the IRRs for the total cash flows
on slide 24.
x ≡
• Let then
2
i*
A2
10
)x1(
1
+
−
2
10
)x1(x
+
2
2
0
−=
,8
000
+
,1
900
x
2
≡
*
A2 =
i
%9.19
CBA 3. Bases for Comparison of Alternatives
30
IRR on Total Investment (2)
... | https://ocw.mit.edu/courses/esd-72-engineering-risk-benefit-analysis-spring-2007/1ddaa9c180aa7db04223045ffdc70817_cba3.pdf |
AE-)based results using total and
incremental investments are identical.
Approach
1. Make sure the cash flows satisfy the conditions on
slide 19.
2. List alternatives in ascending order based on
initial cost.
CBA 3. Bases for Comparison of Alternatives
33
PW on Incremental Investment Revisited
(2)
3. The “current b... | https://ocw.mit.edu/courses/esd-72-engineering-risk-benefit-analysis-spring-2007/1ddaa9c180aa7db04223045ffdc70817_cba3.pdf |
atives
36
The Example Revisited (3)
• Finally,
)15(PW
−=−
AA
3
1
,5
000
+
100,1
10
+
)15.01(
−
)15.01(15.0
+
1
10
=
=
521
>
0
• Therefore, A3 becomes the current and final best
alternative. This is the same as in slide 28, but not
the result on slide 31 (best: A1).
CBA 3. Bases for Comparison of Alternatives
37
Sum... | https://ocw.mit.edu/courses/esd-72-engineering-risk-benefit-analysis-spring-2007/1ddaa9c180aa7db04223045ffdc70817_cba3.pdf |
atives
40
Example (2)
• AE(A) = 6.4K + 4K (A/P, 7%, 6) 6.4K + 4K (0.21)
≈
= $7,240
• AE(B) = 1.4K + 16K(A/P, 7%, 3) 1.4K+16K (0.38)
≈
= $7,480
• AE(C) = 1K + 20K (A/P, 7%, 4) 1K+ 20K (0.3) =
≈
= $7,000
CBA 3. Bases for Comparison of Alternatives
41
Repeating Cash Flows (1)
• When sequences... | https://ocw.mit.edu/courses/esd-72-engineering-risk-benefit-analysis-spring-2007/1ddaa9c180aa7db04223045ffdc70817_cba3.pdf |
5
6
7
8
9
10
11
12
Extended Cash Flows
A
(in $000)
4
6.4
6.4
6.4
6.4
6.4
10.4
6.4
6.4
6.4
6.4
6.4
6.4
B
(in $000)
16
1.4
1.4
17.4
1.4
1.4
17.4
1.4
1.4
17.4
1.4
1.4
1.4
C
(in $000)
20
1
1
1
21
1
1
1
21
1
1
1
1
CBA 3. Bases for Comparison of Alternatives
44
Present ... | https://ocw.mit.edu/courses/esd-72-engineering-risk-benefit-analysis-spring-2007/1ddaa9c180aa7db04223045ffdc70817_cba3.pdf |
Comparison of Alternatives
45
Present Worth of Original Alternatives
• PW(A, 6 yrs) = 4 + 6.4(P/A, 7%, 6) = 4 +(6.4)(4.76) =
= $34.46K
• PW(B, 3 yrs) = 16 + 1.4 (P/A, 7%, 3) =
= 16 +(1.4)(2.62) = $19.68K
• PW(C, 4 yrs) = 20 + 1 (P/A, 7%, 4) = 20 + 1(3.4) =
= $23.4K
• These are the PWs of costs over the actual life... | https://ocw.mit.edu/courses/esd-72-engineering-risk-benefit-analysis-spring-2007/1ddaa9c180aa7db04223045ffdc70817_cba3.pdf |
Big Picture
1
2.003J/1.053J Dynamics and Control I, Spring 2007
Professor Thomas Peacock
2/7/2007
Lecture 1
Newton’s Laws, Cartesian and Polar
Coordinates, Dynamics of a Single Particle
Big Picture
First Half of the Course → Momentum Principles (Force, Vectors) Newtonian
Dynamics
Second Half of the Course → Lagra... | https://ocw.mit.edu/courses/2-003j-dynamics-and-control-i-spring-2007/1e1173e9515ba00437cf6685d160de3e_lec01.pdf |
or continues to move in a straight line
with constant velocity if there is no resultant force acting on it.
II. 2nd Law - A particle acted upon by a resultant force moves in such a manner
that the time rate of change of its linear momentum is equal to the force.
�
F = ma for a single particle.
where F is the force... | https://ocw.mit.edu/courses/2-003j-dynamics-and-control-i-spring-2007/1e1173e9515ba00437cf6685d160de3e_lec01.pdf |
.053J Dynamics and
Control I, Spring 2007. MIT OpenCourseWare (http://ocw.mit.edu), Massachusetts Institute of Technology.
Downloaded on [DD Month YYYY].
Two coordinate systems: Cartesian and Polar
3
r is position, and t is time. The direction of v is in the direction of Δr as Δt → 0.
The acceleration:
Ac... | https://ocw.mit.edu/courses/2-003j-dynamics-and-control-i-spring-2007/1e1173e9515ba00437cf6685d160de3e_lec01.pdf |
by MIT OCW.
=
eˆr + r
dr
dt
deˆr = r˙eˆr + rθ˙eˆθ
dr
dt
dt
= ¨reˆr + ˙rθ˙eˆθ + ˙rθ˙eˆθ + rθ ¨ eˆθ − rθ˙2eˆr
v =
a =
dv
dt
a = (¨r − rθ˙2) ˆer + (rθ ¨ + 2 ˙rθ˙) ˆeθ
d
dt
eˆθ = −θ˙eˆr
Proof that dt = θeˆθ:
deˆr
˙
Figure 3: Differentiation of unit vectors. Changes in the direction of unit vector
eˆr can... | https://ocw.mit.edu/courses/2-003j-dynamics-and-control-i-spring-2007/1e1173e9515ba00437cf6685d160de3e_lec01.pdf |
Single Particle (Review)
Figure 4: A point mass m moves from r(t0) to r(t). Figure by MIT OCW.
Consequences of Newton’s Second Law: Linear and Angular Mo
mentum Conservation
Using an inertial frame of reference, here is the expression of Newton II:
�
F = ma
.
Linear Momentum Principle
�
F = (mv) = p˙
d
dt
(p =... | https://ocw.mit.edu/courses/2-003j-dynamics-and-control-i-spring-2007/1e1173e9515ba00437cf6685d160de3e_lec01.pdf |
cross product of two
parallel vectors is zero.
Define Resultant Torque around B. τ B = r × �
F is the moment of the total
force about B. Combining this definition with Equation (2) yields
τ B = h˙
B + vB × mv.
If τB = 0 and vB = 0 or vB � mv ⇒ h˙ B = 0 (Conservation of Angular
Momentum)
Cite as: Thomas Peacock an... | https://ocw.mit.edu/courses/2-003j-dynamics-and-control-i-spring-2007/1e1173e9515ba00437cf6685d160de3e_lec01.pdf |
MASSACHUSETTS INSTITUTE OF TECHNOLOGY
SLOAN SCHOOL OF MANAGEMENT
15.565 Integrating Information Systems:
Technology, Strategy, and Organizational Factors
15.578 Global Information Systems:
Communications & Connectivity Among Information Systems
Spring 2002
Lecture 4
INTER- AND INTRA-
ORGANIZATIONAL SYSTEMS
1
Diff... | https://ocw.mit.edu/courses/15-565j-integrating-esystems-global-information-systems-spring-2002/1e11f1d7504656e102fec6aa1f2283f7_lecture04.pdf |
. SUPPORTING COST AND DIFFERENTIATION
STRATEGIES
2. ALTERING INDUSTRY STRUCTURE
3. SPAWNING ENTIRELY NEW BUSINESSES
EFFECTIVE STRATEGIES DO ALL THREE!
6
EXAMPLE
FIRM INFRASTRUCTURE
HUMAN RESOURCE MANAGEMENT
TECHNOLOGY DEVELOPMENT
MARGIN
PROCUREMENT
INBOUND
LOGISTICS
OPERATIONS
OUTBOUND
LOGISTICS
MARKETI... | https://ocw.mit.edu/courses/15-565j-integrating-esystems-global-information-systems-spring-2002/1e11f1d7504656e102fec6aa1f2283f7_lecture04.pdf |
6% / yr
• Profit growth 2% / yr
8
MCKESSON - CASE (continued)
MCKESSON - CASE (continued)
• DRUG WHOLESALING
• Industry ($9B)
• Problem Area
• “Kill or Cure” - Alternatives?
Mfg
Direct
60%
(rising)
(dropping)
Chain Drug Store
Distributors/
Wholesalers
40%
{ McKesson
20%
Independent
Drug Stores
9
... | https://ocw.mit.edu/courses/15-565j-integrating-esystems-global-information-systems-spring-2002/1e11f1d7504656e102fec6aa1f2283f7_lecture04.pdf |
•
• Customer reduced by 25% but average order size increased
• Increase “Switching Costs”
IMPROVEMENTS IN OPERATIONS
• Telephone Order -taker Clerks: Reduced from 700 to 15
• Purchasing Staff: Reduced from 140 to 12
• Warehouses: Decrease 50% (“mother trucks”)
• OFFICE AND WAREHOUSE PRODUCTIVITY INCREASED
• ROL... | https://ocw.mit.edu/courses/15-565j-integrating-esystems-global-information-systems-spring-2002/1e11f1d7504656e102fec6aa1f2283f7_lecture04.pdf |
00 M/yr prescription)
16
OTHER LESSONS LEARNED
• Changing customer behavior difficult
• Changing corporate “culture” difficult
• Needs lots of top management patience
• Attempts to use these approaches not always
successful
17
SUMMARY
• NEED TO EXPLORE NEW STRATEGIES AND PROCESSES --
MIGHT TRANSFORM COMPANY A... | https://ocw.mit.edu/courses/15-565j-integrating-esystems-global-information-systems-spring-2002/1e11f1d7504656e102fec6aa1f2283f7_lecture04.pdf |
Simplest Car Following Tra(cid:14)c Flow Model.
Rodolfo R. Rosales
.
(cid:3)
MIT, Friday March 26, 1999.
Abstract
These notes describe in some detail the continuum limit behavior of a very simple car following
tra(cid:14)c (cid:13)ow model. The formation and behavior of shock waves is described. This model is the
one s... | https://ocw.mit.edu/courses/18-306-advanced-partial-differential-equations-with-applications-fall-2009/1e6a824d45c144cecd4c0154ea3006a0_MIT18_306f09_lec24_CF_Simple_Model.pdf |
ondimensionalization.
Consider a line of cars on a road, with car n located at ~x
= ~x
(t), moving at speed ~u
=
.
n
n
n
dt
d ~x
n
Measure distance ~x along the road in the same direction the cars move (so the car velocities ~u
are all
n
non-negative). Number the cars so that
~x
is an increasing sequence ( ~x
~x
) > ca... | https://ocw.mit.edu/courses/18-306-advanced-partial-differential-equations-with-applications-fall-2009/1e6a824d45c144cecd4c0154ea3006a0_MIT18_306f09_lec24_CF_Simple_Model.pdf |
ow functions.
As long as the situation is not changing too rapidly, this is not unreasonable. Note that in this model we will,
implicitly, deal with all the cars as if they were equal copies of each other | all the cars obey exactly the same rules.
r
r
Simple Tra(cid:14)c Flow Model.
3
MIT, Friday March 26, 1999 | Ros... | https://ocw.mit.edu/courses/18-306-advanced-partial-differential-equations-with-applications-fall-2009/1e6a824d45c144cecd4c0154ea3006a0_MIT18_306f09_lec24_CF_Simple_Model.pdf |
=
u
;
U ( ~(cid:26)) =
U ((cid:26)) ;
Q( ~(cid:26)) = q
Q((cid:26)) and
t =
t :
n
n
n
J
n
n
n
m
~
~
~
q
m
q
m
L(cid:26)
J
(cid:26)
J
(cid:26)
J
q
m
(1.3)
Then the equations take the form
dx
n
(cid:15)
= u
= U ((cid:26)
)
and (cid:26)
=
;
(1.4)
n
n
n
dt
x
x
n
n
+1
(cid:0)
where (cid:15) = 1=(L(cid:26)
) is a small nondi... | https://ocw.mit.edu/courses/18-306-advanced-partial-differential-equations-with-applications-fall-2009/1e6a824d45c144cecd4c0154ea3006a0_MIT18_306f09_lec24_CF_Simple_Model.pdf |
spaced, so that
=
.
L
1
Simple Tra(cid:14)c Flow Model.
4
MIT, Friday March 26, 1999 | Rosales.
(cid:26) along the road | say, a hump or a sinusoidal up and down. This perturbation is \marked" by
a discrete set of points (the car positions) and needs a minimum number of them before it can be
clearly identi(cid:12)ed |... | https://ocw.mit.edu/courses/18-306-advanced-partial-differential-equations-with-applications-fall-2009/1e6a824d45c144cecd4c0154ea3006a0_MIT18_306f09_lec24_CF_Simple_Model.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.