-
Gaussian Process Regression Adaptive Density-Guided Approach: Towards Calculations of Potential Energy Surfaces for Larger Molecules
Authors:
Denis G. Artiukhin,
Ian H. Godtliebsen,
Gunnar Schmitz,
Ove Christiansen
Abstract:
We present a new program implementation of the gaussian process regression adaptive density-guided approach [J. Chem. Phys. 153 (2020) 064105] in the MidasCpp program. A number of technical and methodological improvements made allowed us to extend this approach towards calculations of larger molecular systems than those accessible previously and maintain the very high accuracy of constructed poten…
▽ More
We present a new program implementation of the gaussian process regression adaptive density-guided approach [J. Chem. Phys. 153 (2020) 064105] in the MidasCpp program. A number of technical and methodological improvements made allowed us to extend this approach towards calculations of larger molecular systems than those accessible previously and maintain the very high accuracy of constructed potential energy surfaces. We demonstrate the performance of this method on a test set of molecules of growing size and show that up to 80 % of single point calculations could be avoided introducing a root mean square deviation in fundamental excitations of about 3 cm$^{-1}$. A much higher accuracy with errors below 1 cm$^{-1}$ could be achieved with tighter convergence thresholds still reducing the number of single point computations by up to 68 %. We further support our findings with a detailed analysis of wall times measured while employing different electronic structure methods. Our results demonstrate that GPR-ADGA is an effective tool, which could be applied for cost-efficient calculations of potential energy surfaces suitable for highly-accurate vibrational spectra simulations.
△ Less
Submitted 27 March, 2023;
originally announced March 2023.
-
Thermodynamics of an Empty Box
Authors:
Georg J. Schmitz,
Michael te Vrugt,
Tore Haug-Warberg,
Lodin Ellingsen,
Paul Needham,
Raphael Wittkowski
Abstract:
A gas in a box is perhaps the most important model system studied in thermodynamics and statistical mechanics. Usually, studies focus on the gas, whereas the box merely serves as an idealized confinement. The present article focuses on the box as the central object and develops a thermodynamic theory by treating the geometric degrees of freedom of the box as the degrees of freedom of a thermodynam…
▽ More
A gas in a box is perhaps the most important model system studied in thermodynamics and statistical mechanics. Usually, studies focus on the gas, whereas the box merely serves as an idealized confinement. The present article focuses on the box as the central object and develops a thermodynamic theory by treating the geometric degrees of freedom of the box as the degrees of freedom of a thermodynamic system. Applying standard mathematical methods to the thermodynamics of an empty box allows equations with the same structure as those of cosmology and classical and quantum mechanics to be derived. The simple model system of an empty box is shown to have interesting connections to classical mechanics, special relativity, and quantum field theory.
△ Less
Submitted 9 February, 2023;
originally announced February 2023.
-
Is thermodynamics fundamental?
Authors:
Michael te Vrugt,
Paul Needham,
Georg J. Schmitz
Abstract:
It is a common view in philosophy of physics that thermodynamics is a non-fundamental theory. This is motivated in particular by the fact that thermodynamics is considered to be a paradigmatic example for a theory that can be reduced to another one, namely statistical mechanics. For instance, the statement "temperature is mean molecular kinetic energy" has become a textbook example for a successfu…
▽ More
It is a common view in philosophy of physics that thermodynamics is a non-fundamental theory. This is motivated in particular by the fact that thermodynamics is considered to be a paradigmatic example for a theory that can be reduced to another one, namely statistical mechanics. For instance, the statement "temperature is mean molecular kinetic energy" has become a textbook example for a successful reduction, despite the fact that this statement is not correct for a large variety of systems. In this article, we defend the view that thermodynamics is a fundamental theory, a position that we justify based on four case studies from recent physical research. We explain how entropic gravity (1) and black hole thermodynamics (2) can serve as case studies for the multiple realizability problem which blocks the reduction of thermodynamics. Moreover, we discuss the problem of the reducibility of phase transitions and argue that bifurcation theory (3) allows the modelling of "phase transitions" on a thermodynamic level even in finite systems. It is also shown that the derivation of irreversible transport equations in the Mori-Zwanzig formalism (4) does not, despite recent claims to the contrary, constitute a reduction of thermodynamics to quantum mechanics. Finally, we briefly discuss some arguments against the fundamentality of thermodynamics that are not based on reduction.
△ Less
Submitted 8 April, 2022;
originally announced April 2022.
-
Frequency-Dependent F-Number Increases the Contrast and the Spatial Resolution in Fast Pulse-Echo Ultrasound Imaging
Authors:
Martin F. Schiffner,
Georg Schmitz
Abstract:
Fixed $F$-numbers reduce grating lobe artifacts in fast pulse-echo ultrasound imaging. Such $F$-numbers result in dynamic receive subapertures whose widths vary with the focal position. These subapertures, however, ignore useful low-frequency components in the excluded radio frequency (RF) signals and, thus, reduce the lateral resolution. Here, we propose a frequency-dependent $F$-number to simult…
▽ More
Fixed $F$-numbers reduce grating lobe artifacts in fast pulse-echo ultrasound imaging. Such $F$-numbers result in dynamic receive subapertures whose widths vary with the focal position. These subapertures, however, ignore useful low-frequency components in the excluded radio frequency (RF) signals and, thus, reduce the lateral resolution. Here, we propose a frequency-dependent $F$-number to simultaneously suppress grating lobe artifacts and maintain the lateral resolution. This $F$-number, at high frequencies, reduces the receive subaperture to remove spatially undersampled components of the RF signals and suppress grating lobes. The $F$-number, at low frequencies, enlarges the receive subaperture to use the components of all RF signals and maintain the lateral resolution. Experiments validated the proposed $F$-number and demonstrated improvements in the contrast and the widths of wire targets of up to 3.2 % and 12.8 %, respectively.
△ Less
Submitted 5 January, 2023; v1 submitted 8 November, 2021;
originally announced November 2021.
-
The modular Atom Probe Concept
Authors:
Patrick Stender,
Helena Solodenko,
Andreas Weigel,
Irdi Balla,
Tim Maximilian Schwarz,
Jonas Ott,
Manuel Roussell,
Rüya Duran,
Sebastian Eich,
Mohammad Al-Shakran,
Timo Jacob,
Guido Schmitz
Abstract:
Atomic probe tomography (APT), based on the work of Erwin Mueller, is able to generate three-dimensional chemical maps in atomic resolution. The required instruments for APT have evolved over the last 20 years from an experimental to an established method of materials analysis. Here, we describe the realization of a new instrument concept that allows the direct attachment of APT to a dual beam SEM…
▽ More
Atomic probe tomography (APT), based on the work of Erwin Mueller, is able to generate three-dimensional chemical maps in atomic resolution. The required instruments for APT have evolved over the last 20 years from an experimental to an established method of materials analysis. Here, we describe the realization of a new instrument concept that allows the direct attachment of APT to a dual beam SEM microscope with the main achievement of fast and direct sample transfer. New operational modes are enabled regarding sample geometry, alignment of tips and microelectrode. The instrument is optimized to handle cryo-samples at all stages of preparation and storage. The instrument comes with its own software for evaluation and reconstruction. The performance in terms of mass resolution, aperture angle, and detection efficiency is demonstrated with a few application examples.
△ Less
Submitted 7 May, 2021;
originally announced May 2021.
-
Status and direction of atom probe analysis of frozen liquids
Authors:
Patrick Stender,
Baptiste Gault,
Tim M. Schwarz,
Eric V. Woods,
Se-Ho Kim,
Jonas Ott,
Leigh T. Stephenson,
Guido Schmitz,
Christoph Freysoldt,
Johannes Kästner,
Ayman A. El-Zoka
Abstract:
Imaging of liquids and cryogenic biological materials by electron microscopy has been recently enabled by innovative approaches for specimen preparation and the fast development of optimised instruments for cryo-enabled electron microscopy (cryo-EM). Yet, Cryo-EM typically lacks advanced analytical capabilities, in particular for light elements. With the development of protocols for frozen wet spe…
▽ More
Imaging of liquids and cryogenic biological materials by electron microscopy has been recently enabled by innovative approaches for specimen preparation and the fast development of optimised instruments for cryo-enabled electron microscopy (cryo-EM). Yet, Cryo-EM typically lacks advanced analytical capabilities, in particular for light elements. With the development of protocols for frozen wet specimen preparation, atom probe tomography (APT) could advantageously complement insights gained by cryo-EM. Here, we report on different approaches that have been recently proposed to enable the analysis of relatively large volumes of frozen liquids from either a flat substrate or the fractured surface of a wire. Both allowed for analysing water ice layers which are several microns thick consisting of pure water, pure heavy-water and aqueous solutions. We discuss the merits of both approaches, and prospects for further developments in this area. Preliminary results raise numerous questions, in part concerning the physics underpinning field evaporation. We discuss these aspects and lay out some of the challenges regarding the APT analysis of frozen liquids.
△ Less
Submitted 3 February, 2021;
originally announced February 2021.
-
Reliable and interoperable computational molecular engineering: 2. Semantic interoperability based on the European Materials and Modelling Ontology
Authors:
Martin Thomas Horsch,
Silvia Chiacchiera,
Youness Bami,
Georg J. Schmitz,
Gabriele Mogni,
Gerhard Goldbeck,
Emanuele Ghedini
Abstract:
The European Materials and Modelling Ontology (EMMO) is a top-level ontology designed by the European Materials Modelling Council to facilitate semantic interoperability between platforms, models, and tools in computational molecular engineering, integrated computational materials engineering, and related applications of materials modelling and characterization. Additionally, domain ontologies exi…
▽ More
The European Materials and Modelling Ontology (EMMO) is a top-level ontology designed by the European Materials Modelling Council to facilitate semantic interoperability between platforms, models, and tools in computational molecular engineering, integrated computational materials engineering, and related applications of materials modelling and characterization. Additionally, domain ontologies exist based on data technology developments from specific platforms. The present work discusses the ongoing work on establishing a European Virtual Marketplace Framework, into which diverse platforms can be integrated. It addresses common challenges that arise when marketplace-level domain ontologies are combined with a top-level ontology like the EMMO by ontology alignment.
△ Less
Submitted 13 January, 2020;
originally announced January 2020.
-
Theory-training deep neural networks for an alloy solidification benchmark problem
Authors:
M. Torabi Rad,
A. Viardin,
G. J. Schmitz,
M. Apel
Abstract:
Deep neural networks are machine learning tools that are transforming fields ranging from speech recognition to computational medicine. In this study, we extend their application to the field of alloy solidification modeling. To that end, and for the first time in the field, theory-trained deep neural networks (TTNs) for solidification are introduced. These networks are trained using the framework…
▽ More
Deep neural networks are machine learning tools that are transforming fields ranging from speech recognition to computational medicine. In this study, we extend their application to the field of alloy solidification modeling. To that end, and for the first time in the field, theory-trained deep neural networks (TTNs) for solidification are introduced. These networks are trained using the framework founded by Raissi et al.[1-3] and a theory that consists of a mathematical macroscale solidification model and the boundary and initial conditions of a well-known solidification benchmark problem. One of the main advantages of TTNs is that they do not need any prior knowledge of the solution of the governing equations or any external data for training. Using the built-in capabilities in TensorFlow, networks with different widths and depths are trained, and their predictions are examined in detail to verify that they satisfy both the model equations and the initial and boundary conditions of the benchmark problem. Issues that are critical in theory-training are identified, and guidelines that can be used in the future for successful and efficient training of similar networks are proposed. Through this study, theory-trained deep neural networks are shown to be a viable tool to simulate alloy solidification problems.
△ Less
Submitted 20 December, 2019;
originally announced December 2019.
-
Transversal ultrasound light guiding deep into scattering media
Authors:
Maxim Cherkashin,
Carsten Brenner,
Georg Schmitz,
Martin Hofmann
Abstract:
Biomedical applications requiring tissue diagnosis, activation, and treatment could be substantially leveraged by optical methods, owing to their unique feature set. However, their widespread application is severely limited by the strong light scattering that occurs in many tissues of interest, which dramatically limits achievable penetration depths. Here we demonstrate a new method to solve this…
▽ More
Biomedical applications requiring tissue diagnosis, activation, and treatment could be substantially leveraged by optical methods, owing to their unique feature set. However, their widespread application is severely limited by the strong light scattering that occurs in many tissues of interest, which dramatically limits achievable penetration depths. Here we demonstrate a new method to solve this issue by utilizing free-running ultrasound waves, transversal to the light propagation direction, to guide light into deeper tissue regions. We study the formation of the ultrasound-induced refractive index structures and waveguides using simple ultrasound field configurations and analyze their effects on the propagation of short light pulses. Our results show waveguide support and associated light intensity increase up to the depths of at least 20 mm in Intralipid-20% phantoms with a reduced scattering coeffcient close to real tissue. Thus we present an important milestone towards low-loss light delivery, focusing and manipulation in deep tissue.
△ Less
Submitted 22 October, 2019;
originally announced October 2019.
-
The Web SSO Standard OpenID Connect: In-Depth Formal Security Analysis and Security Guidelines
Authors:
Daniel Fett,
Ralf Kuesters,
Guido Schmitz
Abstract:
Web-based single sign-on (SSO) services such as Google Sign-In and Log In with Paypal are based on the OpenID Connect protocol. This protocol enables so-called relying parties to delegate user authentication to so-called identity providers. OpenID Connect is one of the newest and most widely deployed single sign-on protocols on the web. Despite its importance, it has not received much attention fr…
▽ More
Web-based single sign-on (SSO) services such as Google Sign-In and Log In with Paypal are based on the OpenID Connect protocol. This protocol enables so-called relying parties to delegate user authentication to so-called identity providers. OpenID Connect is one of the newest and most widely deployed single sign-on protocols on the web. Despite its importance, it has not received much attention from security researchers so far, and in particular, has not undergone any rigorous security analysis.
In this paper, we carry out the first in-depth security analysis of OpenID Connect. To this end, we use a comprehensive generic model of the web to develop a detailed formal model of OpenID Connect. Based on this model, we then precisely formalize and prove central security properties for OpenID Connect, including authentication, authorization, and session integrity properties.
In our modeling of OpenID Connect, we employ security measures in order to avoid attacks on OpenID Connect that have been discovered previously and new attack variants that we document for the first time in this paper. Based on these security measures, we propose security guidelines for implementors of OpenID Connect. Our formal analysis demonstrates that these guidelines are in fact effective and sufficient.
△ Less
Submitted 27 April, 2017;
originally announced April 2017.
-
A Comprehensive Formal Security Analysis of OAuth 2.0
Authors:
Daniel Fett,
Ralf Kuesters,
Guido Schmitz
Abstract:
The OAuth 2.0 protocol is one of the most widely deployed authorization/single sign-on (SSO) protocols and also serves as the foundation for the new SSO standard OpenID Connect. Despite the popularity of OAuth, so far analysis efforts were mostly targeted at finding bugs in specific implementations and were based on formal models which abstract from many web features or did not provide a formal tr…
▽ More
The OAuth 2.0 protocol is one of the most widely deployed authorization/single sign-on (SSO) protocols and also serves as the foundation for the new SSO standard OpenID Connect. Despite the popularity of OAuth, so far analysis efforts were mostly targeted at finding bugs in specific implementations and were based on formal models which abstract from many web features or did not provide a formal treatment at all.
In this paper, we carry out the first extensive formal analysis of the OAuth 2.0 standard in an expressive web model. Our analysis aims at establishing strong authorization, authentication, and session integrity guarantees, for which we provide formal definitions. In our formal analysis, all four OAuth grant types (authorization code grant, implicit grant, resource owner password credentials grant, and the client credentials grant) are covered. They may even run simultaneously in the same and different relying parties and identity providers, where malicious relying parties, identity providers, and browsers are considered as well. Our modeling and analysis of the OAuth 2.0 standard assumes that security recommendations and best practices are followed, in order to avoid obvious and known attacks.
When proving the security of OAuth in our model, we discovered four attacks which break the security of OAuth. The vulnerabilities can be exploited in practice and are present also in OpenID Connect.
We propose fixes for the identified vulnerabilities, and then, for the first time, actually prove the security of OAuth in an expressive web model. In particular, we show that the fixed version of OAuth (with security recommendations and best practices in place) provides the authorization, authentication, and session integrity properties we specify.
△ Less
Submitted 8 August, 2016; v1 submitted 6 January, 2016;
originally announced January 2016.
-
SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web
Authors:
Daniel Fett,
Ralf Kuesters,
Guido Schmitz
Abstract:
Single sign-on (SSO) systems, such as OpenID and OAuth, allow web sites, so-called relying parties (RPs), to delegate user authentication to identity providers (IdPs), such as Facebook or Google. These systems are very popular, as they provide a convenient means for users to log in at RPs and move much of the burden of user authentication from RPs to IdPs.
There is, however, a downside to curren…
▽ More
Single sign-on (SSO) systems, such as OpenID and OAuth, allow web sites, so-called relying parties (RPs), to delegate user authentication to identity providers (IdPs), such as Facebook or Google. These systems are very popular, as they provide a convenient means for users to log in at RPs and move much of the burden of user authentication from RPs to IdPs.
There is, however, a downside to current systems, as they do not respect users' privacy: IdPs learn at which RP a user logs in. With one exception, namely Mozilla's BrowserID system (a.k.a. Mozilla Persona), current SSO systems were not even designed with user privacy in mind. Unfortunately, recently discovered attacks, which exploit design flaws of BrowserID, show that BrowserID does not provide user privacy either.
In this paper, we therefore propose the first privacy-respecting SSO system for the web, called SPRESSO (for Secure Privacy-REspecting Single Sign-On). The system is easy to use, decentralized, and platform independent. It is based solely on standard HTML5 and web features and uses no browser extensions, plug-ins, or other executables.
Existing SSO systems and the numerous attacks on such systems illustrate that the design of secure SSO systems is highly non-trivial. We therefore also carry out a formal analysis of SPRESSO based on an expressive model of the web in order to formally prove that SPRESSO enjoys strong authentication and privacy properties.
△ Less
Submitted 7 August, 2015;
originally announced August 2015.
-
Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web
Authors:
Daniel Fett,
Ralf Kuesters,
Guido Schmitz
Abstract:
BrowserID is a complex, real-world Single Sign-On (SSO) System for web applications recently developed by Mozilla. It employs new HTML5 features (such as web messaging and web storage) and cryptographic assertions to provide decentralized login, with the intent to respect users' privacy. It can operate in a primary and a secondary identity provider mode. While in the primary mode BrowserID runs wi…
▽ More
BrowserID is a complex, real-world Single Sign-On (SSO) System for web applications recently developed by Mozilla. It employs new HTML5 features (such as web messaging and web storage) and cryptographic assertions to provide decentralized login, with the intent to respect users' privacy. It can operate in a primary and a secondary identity provider mode. While in the primary mode BrowserID runs with arbitrary identity providers (IdPs), in the secondary mode there is one IdP only, namely Mozilla's default IdP.
We recently proposed an expressive general model for the web infrastructure and, based on this web model, analyzed the security of the secondary IdP mode of BrowserID. The analysis revealed several severe vulnerabilities.
In this paper, we complement our prior work by analyzing the even more complex primary IdP mode of BrowserID. We do not only study authentication properties as before, but also privacy properties. During our analysis we discovered new and practical attacks that do not apply to the secondary mode: an identity injection attack, which violates a central authentication property of SSO systems, and attacks that break an important privacy promise of BrowserID and which do not seem to be fixable without a major redesign of the system. Some of our attacks on privacy make use of a browser side channel that has not gained a lot of attention so far.
For the authentication bug, we propose a fix and formally prove in a slight extension of our general web model that the fixed system satisfies all the requirements we consider. This constitutes the most complex formal analysis of a web application based on an expressive model of the web infrastructure so far.
As another contribution, we identify and prove important security properties of generic web features in the extended web model to facilitate future analysis efforts of web standards and web applications.
△ Less
Submitted 1 April, 2015; v1 submitted 26 November, 2014;
originally announced November 2014.
-
An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System
Authors:
Daniel Fett,
Ralf Kuesters,
Guido Schmitz
Abstract:
The web constitutes a complex infrastructure and as demonstrated by numerous attacks, rigorous analysis of standards and web applications is indispensable.
Inspired by successful prior work, in particular the work by Akhawe et al. as well as Bansal et al., in this work we propose a formal model for the web infrastructure. While unlike prior works, which aim at automatic analysis, our model so fa…
▽ More
The web constitutes a complex infrastructure and as demonstrated by numerous attacks, rigorous analysis of standards and web applications is indispensable.
Inspired by successful prior work, in particular the work by Akhawe et al. as well as Bansal et al., in this work we propose a formal model for the web infrastructure. While unlike prior works, which aim at automatic analysis, our model so far is not directly amenable to automation, it is much more comprehensive and accurate with respect to the standards and specifications. As such, it can serve as a solid basis for the analysis of a broad range of standards and applications.
As a case study and another important contribution of our work, we use our model to carry out the first rigorous analysis of the BrowserID system (a.k.a. Mozilla Persona), a recently developed complex real-world single sign-on system that employs technologies such as AJAX, cross-document messaging, and HTML5 web storage. Our analysis revealed a number of very critical flaws that could not have been captured in prior models. We propose fixes for the flaws, formally state relevant security properties, and prove that the fixed system in a setting with a so-called secondary identity provider satisfies these security properties in our model. The fixes for the most critical flaws have already been adopted by Mozilla and our findings have been rewarded by the Mozilla Security Bug Bounty Program.
△ Less
Submitted 7 April, 2014; v1 submitted 7 March, 2014;
originally announced March 2014.
-
Hillock formation of Pt thin films on Yttria stabilized Zirconia single crystals
Authors:
Henning Galinski,
Thomas Ryll,
Lukas Schlagenhauf,
Patrick Stender,
Guido Schmitz,
Ludwig J. Gauckler
Abstract:
The stability of a metal thin films on a dielectric substrate is conditioned by the magnitude of the interactive forces at the interface. In the case of a non-reactive interface and weak adhesion, the minimization of free surface energy gives rise to an instability of the thin film. In order to study these effects, Pt thin films with a thickness of 50 nm were deposited via ion-beam sputtering on y…
▽ More
The stability of a metal thin films on a dielectric substrate is conditioned by the magnitude of the interactive forces at the interface. In the case of a non-reactive interface and weak adhesion, the minimization of free surface energy gives rise to an instability of the thin film. In order to study these effects, Pt thin films with a thickness of 50 nm were deposited via ion-beam sputtering on yttria stabilized zirconia single crystals. All Pt films were subjected to heat treatments up to 973 K for 2 h. The morphological evolution of Pt thin films has been investigated by means of scanning electron microscopy (SEM), atomic force microscopy (AFM) and standard image analysis techniques. Three main observations have been made: i) the deposition method has a direct impact on the morphological evolution of the film during annealing. Instead of hole formation, that is typically observed as response to a thermal treatment, anisotropic pyramidal shaped hillocks are formed on top of the film. ii) It is shown by comparing the hillocks' aspect ratio with finite element method (FEM) simulations that the hillock formation can be assigned to a stress relaxation process inside the thin film. iii) By measuring the equilibrium shapes and the shape fluctuations of the formed Pt hillocks the anisotropy of the step free energy and its stiffness have been derived in addition to the anisotropic kink energy of the hillock's edges.
△ Less
Submitted 4 October, 2011;
originally announced October 2011.
-
Modeling Chemical Reactors I: Quiescent Reactors
Authors:
C. E. Michoski,
J. A. Evans,
P. G. Schmitz
Abstract:
We introduce a fully generalized quiescent chemical reactor system in arbitrary space $\vdim =1,2$ or 3, with $n\in\mathbb{N}$ chemical constituents $α_{i}$, where the character of the numerical solution is strongly determined by the relative scaling between the local reactivity of species $α_{i}$ and the local functional diffusivity $\mathscr{D}_{ij}(α)$ of the reaction mixture. We develop an ope…
▽ More
We introduce a fully generalized quiescent chemical reactor system in arbitrary space $\vdim =1,2$ or 3, with $n\in\mathbb{N}$ chemical constituents $α_{i}$, where the character of the numerical solution is strongly determined by the relative scaling between the local reactivity of species $α_{i}$ and the local functional diffusivity $\mathscr{D}_{ij}(α)$ of the reaction mixture. We develop an operator time-splitting predictor multi-corrector RK--LDG scheme, and utilize $hp$-adaptivity relying only on the entropy $\mathscr{S}_{\mathfrak{R}}$ of the reactive system $\mathfrak{R}$. This condition preserves these bounded nonlinear entropy functionals as a necessarily enforced stability condition on the coupled system. We apply this scheme to a number of application problems in chemical kinetics; including a difficult classical problem arising in nonequilibrium thermodynamics known as the Belousov-Zhabotinskii reaction where we utilize a concentration-dependent diffusivity tensor $\mathscr{D}_{ij}(α)$, in addition to solving a simple equilibrium problem in order to evaluate the numerical error behavior.
△ Less
Submitted 27 December, 2010;
originally announced December 2010.
-
A Discontinuous Galerkin Method for Viscous Compressible Multifluids
Authors:
C. Michoski,
J. A. Evans,
P. G. Schmitz,
A. Vasseur
Abstract:
We present a generalized discontinuous Galerkin method for a multicomponent compressible barotropic Navier-Stokes system of equations. The system presented has a functional viscosity nu which depends on the pressure p=p(rho,mu_i) of the flow, with the density rho and the local concentration mu_i. High order Runge-Kutta time discretization techniques are employed, and different methods of dealing…
▽ More
We present a generalized discontinuous Galerkin method for a multicomponent compressible barotropic Navier-Stokes system of equations. The system presented has a functional viscosity nu which depends on the pressure p=p(rho,mu_i) of the flow, with the density rho and the local concentration mu_i. High order Runge-Kutta time discretization techniques are employed, and different methods of dealing with arbitrary coupled boundary conditions are discussed. Analysis of the energy consistency of the scheme is performed in addition to inspection of the relative error of the solution compared to exact analytic test cases. Finally several examples, comparisons, generalizations and physical applications are presented.
△ Less
Submitted 14 May, 2009;
originally announced May 2009.
-
Quantum Hydrodynamics with Trajectories: The Nonlinear Conservation Form Mixed/Discontinuous Galerkin Method with Applications in Chemistry
Authors:
C. Michoski,
J. A. Evans,
P. G. Schmitz,
A. Vasseur
Abstract:
We present a solution to the conservation form (Eulerian form) of the quantum hydrodynamic equations which arise in chemical dynamics by implementing a mixed/discontinuous Galerkin (MDG) finite element numerical scheme. We show that this methodology is stable, showing good accuracy and a remarkable scale invariance in its solution space. In addition the MDG method is robust, adapting well to var…
▽ More
We present a solution to the conservation form (Eulerian form) of the quantum hydrodynamic equations which arise in chemical dynamics by implementing a mixed/discontinuous Galerkin (MDG) finite element numerical scheme. We show that this methodology is stable, showing good accuracy and a remarkable scale invariance in its solution space. In addition the MDG method is robust, adapting well to various initial-boundary value problems of particular significance in a range of physical and chemical applications. We further show explicitly how to recover the Lagrangian frame (or pathline) solutions.
△ Less
Submitted 22 April, 2009;
originally announced April 2009.