An asymptotic Reissner–Mindlin plate model
نویسندگان
چکیده
منابع مشابه
An asymptotic model of a nonlinear adaptive elastic plate
In this paper, an asymptotic method is ued to obtain a model of a nonlinear adaptive elastic plate. The plate is one of two geometric solids that can be used in unison to model the trabeculae of bone. The other is the rod. Modelling of the rod has received much attention [8][12], but not the plate. The model for the plate mirrors what has been done for the rod. Asymptotic expansions are formula...
متن کاملAn asymptotic strain gradient Reissner-Mindlin plate model
In this paper we derive a strain gradient plate model from the three-dimensional equations of strain gradient linearized elasticity. The deduction is based on the asymptotic analysis with respect of a small real parameter being the thickness of the elastic body we consider. The body is constituted by a second gradient isotropic linearly elastic material. The obtained model is recognized as a st...
متن کاملAsymptotic Behavior of Nonlinear Transmission Plate Problem
We study a nonlinear transmission problem for a plate which consists of thermoelastic and isothermal parts. The problem generates a dynamical system in a suitable Hilbert space. Main result is the proof of asymptotic smoothness of this dynamical system and existence of a compact global attractor in special cases.
متن کاملAn updated digital model of plate boundaries
[1] A global set of present plate boundaries on the Earth is presented in digital form. Most come from sources in the literature. A few boundaries are newly interpreted from topography, volcanism, and/or seismicity, taking into account relative plate velocities from magnetic anomalies, moment tensor solutions, and/or geodesy. In addition to the 14 large plates whose motion was described by the ...
متن کاملSecure communications with an asymptotic secrecy model
As knowledge based systems become more sophisticated, communications between systems or among their subsystems often conducted over public channels such as the Internet, wireless medium, etc. To secure communications over public channels, the most often used method is Diffie and Hellman’s public key infrastructure approach. This method requires a trusted third party to verify identifies, which ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Comptes Rendus Mécanique
سال: 2018
ISSN: 1631-0721
DOI: 10.1016/j.crme.2018.04.014