ARTÍCULO
TITULO

Application of the balanced identification method to the reconstruction of the parameters of fast nonlocal heat transfer in a plasma of magnetic thermonuclear fusion

Alexander V. Sokolov    
Alexander B. Kukushkin    
Petr A. Sdvizhenskii    
Pavel V. Minashin    
Alexandra I. Prun    

Resumen

The method of balanced identification, which consists in finding the optimal (in the sense of minimizing the mean square error of cross-validation) correlation between the complexity of the model and the quantity and quality (error) of experimental data, was used to correctly pose the problem of reconstructing the parameters of fast nonlocal heat transfer (FNHT) in plasma in installations for magnetic thermonuclear fusion. These phenomena manifest themselves in the instantaneous (on the time scale of heat diffusion described by the heat conduction equation) response of the spatial profile of the electron temperature to its local perturbation. The balanced identification method was used to identify the parameters of FNHT models and to verify the models themselves. These models are based on nonlocal heat transfer by electromagnetic (EM) waves with a large mean free path, described by integral (superdiffusion) equations, with respect to space variables, that are not reducible to diffusion-type differential equations. In particular, it was shown that FNHT by the EM waves in a plasma requires too high a reflectivity of the walls of the vacuum chamber to describe the experimental data on tokamaks and stellarator. Here we give a brief overview of the previous results and present the latest results of the FNHT model, which assumes strong internal reflection of waves in plasma and is compatible with the model of ?wild cables? for the transfer of TEM waves along magnetically-coupled skeletal nanostructures. It is shown that for superdiffusive physical models of FNHT the balanced identification method is an effective tool for their verification. The calculations are carried out using the optimization modeling services deployed in the Everest distributed computing environment (http://everest.distcomp.org/).

 Artículos similares

       
 
Konstantinos Charmanas, Nikolaos Mittas and Lefteris Angelis    
Security vulnerabilities constitute one of the most important weaknesses of hardware and software security that can cause severe damage to systems, applications, and users. As a result, software vendors should prioritize the most dangerous and impactful ... ver más
Revista: Information

 
Hugo Silva and Jorge Bernardino    
Decision support systems with machine learning can help organizations improve operations and lower costs with more precision and efficiency. This work presents a review of state-of-the-art machine learning algorithms for binary classification and makes a... ver más
Revista: Algorithms

 
Lena A. Hofmann, Steffen Lau and Johannes Kirchebner    
Linear statistical methods may not be suited to the understanding of psychiatric phenomena such as aggression due to their complexity and multifactorial origins. Here, the application of machine learning (ML) algorithms offers the possibility of analyzin... ver más
Revista: Applied Sciences

 
Guangqing Li, Xueqin Yao, Chunqing Liu, Lei Huang, Chenghong Liu and Zhujie Xie    
According to the requirements of different fertilizers for early-maturing and late-maturing broccoli, this study aimed to establish the models of formula fertilization to apply them in the recommendation of fertilization by the aid of soil testing perfor... ver más
Revista: Applied Sciences

 
Anargiros I. Delis, Maria Kazolea and Maria Gaitani    
This work aims to supplement the realization and validation of a higher-order well-balanced unstructured finite volume (FV) scheme, that has been relatively recently presented, for numerically simulating weakly non-linear weakly dispersive water waves ov... ver más
Revista: Water