• Aucun résultat trouvé

Computers and Mathematics with Applications

N/A
N/A
Protected

Academic year: 2022

Partager "Computers and Mathematics with Applications"

Copied!
11
0
0

Texte intégral

(1)

Contents lists available atScienceDirect

Computers and Mathematics with Applications

journal homepage:www.elsevier.com/locate/camwa

Well-posedness study for a time-domain spherical cloaking model

Jichun Li

Department of Mathematical Sciences, University of Nevada Las Vegas, Las Vegas, NV 89154-4020, USA

a r t i c l e i n f o

Article history:

Received 29 April 2014

Received in revised form 10 September 2014

Accepted 5 October 2014 Available online 29 October 2014

Keywords:

Maxwell’s equations Invisibility cloak Well-posedness Metamaterials

a b s t r a c t

In this paper, we study a time-domain spherical cloaking model recently introduced by Zhao and Hao (2009). This model is quite complicated and is composed of four coupled differential equations. Here we first prove the existence and uniqueness of a solution for this model. Then we obtain a stability result, which analysis is quite involved due to the coupling between the four variables. To our best knowledge, this is the first well-posedness study carried out for the time-domain cloaking model with metamaterials.

©2014 Elsevier Ltd. All rights reserved.

1. Introduction

The idea of invisibility cloaking using metamaterials started in 2006 when Pendry et al. [1] and Leonhardt [2] laid out the blueprints for making objects invisible to electromagnetic waves. In late 2006, a 2-D reduced cloak was successfully fabricated and demonstrated to work at 8.5 GHz and relied upon local resonances of split ring resonators [3]. This is the first practical realization of such a cloak, and the result matches well with the computer simulation [4] performed using the commercial package COMSOL. The cloaking technique of [1,2] is to establish a correspondence between physical material pa- rameters (the material’s permittivity and permeability) and coordinate transformations. The conceptual device constructed with these material parameters is able to guide waves to propagate around the cloaked region (usually the central region of the cloaking structure), and render the objects placed inside invisible to external electromagnetic radiations. It turns out that essentially the same idea was discussed earlier in 2003 by Greenleaf, Lassas, and Uhlmann [5,6] for electrical impedance tomography. Now this transformation technique is widely used in various cloak designs, and has earned a variety of names such as Transformation Electromagnetics, Transformation Optics, Transformation Acoustics, and Transformation Elastody- namics (see recent review papers [7–10] and the book [11]).

In addition to the transformation optics (and acoustics) technique, there are many different avenues towards electro- magnetic and acoustic cloaking. Another kind of cloaking [12,13] requires a negative refractive index shell, which allows for the cloaking of a discrete set of dipoles when they are located within a given distance outside the shell. A third kind of cloaking uses complementary media to cloak objects at a distance outside the cloaking shell [14]. A fourth kind of cloak- ing is obtained via active scattering cancellation devices not completely surrounding the cloaked region (exterior cloaking) [15,16]. A very recent cloaking technique is to use zero index metamaterials loaded with normal dielectric defects [17,18].

Since 2006, study of using metamaterials to construct invisibility cloaks has been a very hot research topic. A search on ‘‘metamaterials and cloaking’’ overscholar.google.com(conducted on April 28, 2014) shows 1880 publications since

Tel.: +1 702 895 0365.

E-mail address:jichun@unlv.nevada.edu.

http://dx.doi.org/10.1016/j.camwa.2014.10.007 0898-1221/©2014 Elsevier Ltd. All rights reserved.

(2)

2013. Most of them focus on engineering and physics. Compared to the huge amount of papers published in engineering and physics, there are not much mathematical analyses done for metamaterials and cloaking, even though numerical sim- ulation in metamaterials [19,20] plays a very important role in cloaking structure design and validation of the theoretical predictions.

In recent years, mathematicians have started investigating this fascinating subject, but most works are still limited to frequency-domain or the quasi-static regime by mainly solving the Helmholtz equation [21–27], and the time-harmonic Maxwell’s equations [28,29]. The advancement of broadband cloaks [30,31] makes time-domain cloaking simulation more appealing and necessary. Generally speaking, electromagnetic wave cloaking simulation boils down to solving metamaterial Maxwell’s equations in either frequency-domain or time-domain. In 2012, we developed the first time-domain finite element method to simulate a cylindrical cloak [32], and completed the well-posedness study of this model in [33]. In this work, we carry out a rigorous analysis of the well-posedness for a time-domain spherical cloaking model recently developed and simulated by using the FDTD method [34]. Though there exist a few publications on well-posedness for metamaterial Maxwell’s equations in frequency-domain (e.g. [35–37]) and time-domain [38], to the best of the author’s knowledge, we are unaware of other works on the well-posedness study of time-domain cloaking models. The major challenge for the analysis is that this model is quite complicated, and is formed by four mixed order differential equations with four vector unknowns.

The rest of the paper is organized as follows. In Section2, we provide a detailed derivation of the time-domain spherical cloak modeling equations, since the original paper does not even present the complete set of governing equations. Then in Section3, we first prove the existence and uniqueness of our model problem, then we prove the stability of the model. We conclude the paper in Section4.

2. The modeling equations

The permittivity and permeability of the ideal spherical cloak are given by [1]:

ϵ

r

= µ

r

=

R2 R2

R1

r

R1 r

2

,

R1

r

R2

,

(1)

ϵ

θ

= µ

θ

=

R2

R2

R1

, ϵ

φ

= µ

φ

=

R2

R2

R1

,

(2)

whereR1andR2are the inner and outer radii of the cloak, andrdenotes the radial distance from the center of the cloak.

Due to the inconvenience of cloaking simulation in spherical coordinate (e.g., COMSOL, the popular simulation software in this area, is only for Cartesian coordinate), the permittivity and permeability parameters given above have to be changed to Cartesian coordinate via the following transformation [34]:

ϵ

xx

ϵ

xy

ϵ

xz

ϵ

yx

ϵ

yy

ϵ

yz

ϵ

zx

ϵ

zy

ϵ

zz

=

sin

θ

cos

φ

cos

θ

cos

φ −

sin

φ

sin

θ

sin

φ

cos

θ

sin

φ

cos

φ

cos

θ −

sin

θ

0

 

ϵ

r 0 0 0

ϵ

θ 0

0 0

ϵ

φ

×

sin

θ

cos

φ

sin

θ

sin

φ

cos

θ

cos

θ

cos

φ

cos

θ

sin

φ −

sin

θ

sin

φ

cos

φ

0

.

(3)

Substituting(3)into the constitutive equation

ϵ

0

ϵ

xx

ϵ

xy

ϵ

xz

ϵ

yx

ϵ

yy

ϵ

yz

ϵ

zx

ϵ

zy

ϵ

zz

 E

x

Ey Ez

=

D

x

Dy Dz

,

we have (details see [34]):

ϵ

0Ex

=

1

ϵ

r

sin2

θ

cos2

φ +

1

ϵ

θ cos2

θ

cos2

φ +

1

ϵ

φsin2

φ

Dx

+

1

ϵ

r

sin2

θ

sin

φ

cos

φ +

1

ϵ

θ cos2

θ

sin

φ

cos

φ −

1

ϵ

φsin

φ

cos

φ

Dy

+

1

ϵ

r

sin

θ

cos

θ

cos

φ −

1

ϵ

θ sin

θ

cos

θ

cos

φ

Dz

,

(4)

ϵ

0Ey

=

1

ϵ

r

sin2

θ

sin

φ

cos

φ +

1

ϵ

θ cos2

θ

sin

φ

cos

φ −

1

ϵ

φsin

φ

cos

φ

Dx

+

1

ϵ

r

sin2

θ

sin2

φ +

1

ϵ

θ cos2

θ

sin2

φ +

1

ϵ

φcos2

φ

Dy

+

1

ϵ

r

sin

θ

cos

θ

sin

φ −

1

ϵ

θ sin

θ

cos

θ

sin

φ

Dz

,

(5)

(3)

ϵ

0Ez

=

1

ϵ

r

sin

θ

cos

θ

cos

φ −

1

ϵ

θ

sin

θ

cos

θ

cos

φ

Dx

+

1

ϵ

r

sin

θ

cos

θ

sin

φ −

1

ϵ

θ

sin

θ

cos

θ

sin

φ

Dy

+

1

ϵ

r

cos2

θ +

1

ϵ

θ

sin2

θ

Dz

,

(6)

where

ϵ

0is the permittivity in air,E

= (

Ex

,

Ey

,

Ez

)

andD

= (

Dx

,

Dy

,

Dz

)

are the electric field and electric flux density, respectively.

Since

ϵ

r

= µ

r

∈ [

0

,

R2R2R1

] <

1, the cloak cannot be directly simulated [34] with(1). In this situation,

ϵ

rand

µ

rare often mapped by using some dispersive material models. In [34], the Drude model

ϵ

r

(ω) =

1

− ω

p2

ω

2

j

ωγ ,

(7)

is used, where

ω

is the general wave frequency, and

ω

pand

γ

are the electric plasma and collision frequencies of the material, respectively. By varying the plasma frequency with space, the radial dependent material parameters in(1)can be achieved.

For example, in cloak simulation [39,34,32],

ω

pis calculated using

ω

p

= ω √

1

− ϵ

rwith

ϵ

rcalculated from(1)for the ideal lossless case.

The time-domain governing equation for the componentExis given by [34, Eq. (16)]:

ϵ

0

2

t2

+ γ ∂

t

+ ω

2p

Ex

=

sin2

θ

cos2

φ

2

t2

+ γ ∂

t

+

cos2

θ

sin2

φ ϵ

θ

+

sin

2

φ ϵ

φ

 

2

t2

+ γ ∂

t

+ ω

2p



Dx

+

sin2

θ

sin

φ

cos

φ

2

t2

+ γ ∂

t

+

cos2

θ

sin

φ

cos

φ ϵ

θ

sin

φ

cos

φ ϵ

φ

 

2

t2

+ γ ∂

t

+ ω

2p



Dy

+

sin

θ

cos

θ

cos

φ

2

t2

+ γ ∂

t

sin

θ

cos

θ

cos

φ ϵ

θ

2

t2

+ γ ∂

t

+ ω

2p



Dz

.

(8)

Following the same idea as [34] by substituting(7)into(5), we obtain

ϵ

0

2

j

ωγ − ω

2p

)

Ey

=

2

j

ωγ )

sin2

θ

sin

φ

cos

φ +

cos2

θ

sin

φ

cos

φ ϵ

θ

sin

φ

cos

φ ϵ

φ

2

j

ωγ − ω

2p

)

Dx

+

2

j

ωγ )

sin2

θ

sin2

φ +

cos2

θ

sin2

φ ϵ

θ

+

cos

2

φ ϵ

φ

2

j

ωγ − ω

2p

)

Dy

+

2

j

ωγ )

sin

θ

cos

θ

sin

φ −

sin

θ

cos

θ

sin

φ

ϵ

θ

2

j

ωγ − ω

2p

)

Dz

,

which can be written in time domain (assuming time-harmonic variation ofejωt) as

ϵ

0

2

t2

+ γ ∂

t

+ ω

2p

Ey

=

sin2

θ

sin

φ

cos

φ

2

t2

+ γ ∂

t

+

cos2

θ

sin

φ

cos

φ ϵ

θ

sin

φ

cos

φ ϵ

φ

 

2

t2

+ γ ∂

t

+ ω

2p



Dx

+

sin2

θ

sin2

φ

2

t2

+ γ ∂

t

+

cos2

θ

sin2

φ ϵ

θ

+

cos

2

φ ϵ

φ

 

2

t2

+ γ ∂

t

+ ω

2p



Dy

+

sin

θ

cos

θ

sin

φ

2

t2

+ γ ∂

t

sin

θ

cos

θ

sin

φ ϵ

θ

2

t2

+ γ ∂

t

+ ω

2p



Dz

.

(9)

Similarly, substituting(7)into(6), we have

ϵ

0

2

t2

+ γ ∂

t

+ ω

2p

Ez

=

sin

θ

cos

θ

cos

φ

2

t2

+ γ ∂

t

sin

θ

cos

θ

cos

φ ϵ

θ

2

t2

+ γ ∂

t

+ ω

2p



Dx

+

sin

θ

cos

θ

sin

φ

2

t2

+ γ ∂

t

sin

θ

cos

θ

sin

φ ϵ

θ

2

t2

+ γ ∂

t

+ ω

2p



Dy

+

 cos2

θ

2

t2

+ γ ∂

t

+

sin

2

θ ϵ

θ

2

t2

+ γ ∂

t

+ ω

p2



Dz

.

(10)

(4)

Denote the matricesMAandMBas:

MA

=

cos2

θ

cos2

φ +

sin2

φ

cos2

θ

sin

φ

cos

φ −

sin

φ

cos

φ −

sin

θ

cos

θ

cos

φ

cos2

θ

sin

φ

cos

φ −

sin

φ

cos

φ

cos2

θ

sin2

φ +

cos2

φ −

sin

θ

cos

θ

sin

φ

sin

θ

cos

θ

cos

φ −

sin

θ

cos

θ

sin

φ

sin2

θ

and

MB

=

sin2

θ

cos2

φ

sin2

θ

sin

φ

cos

φ

sin

θ

cos

θ

cos

φ

sin2

θ

sin

φ

cos

φ

sin2

θ

sin2

φ

sin

θ

cos

θ

sin

φ

sin

θ

cos

θ

cos

φ

sin

θ

cos

θ

sin

φ

cos2

θ

.

Using the fact

ϵ

θ

= ϵ

φ, we can write(8)–(10)as a vector equation

ϵ

0

ϵ

φ

2

t2

+ γ ∂

t

+ ω

2p

E

=

2

t2

+ γ ∂

t

+ ω

2p

MAD

+ ϵ

φ

2

t2

+ γ ∂

t

MBD

.

(11)

By the same technique, applying the Drude model

µ

r

(ω) =

1

− ω

2pm

ω

2

j

ωγ

m

,

(12)

to the magnetic constitutive equation

µ

0

µ

xx

µ

xy

µ

xz

µ

yx

µ

yy

µ

yz

µ

zx

µ

zy

µ

zz

 H

x

Hy Hz

=

B

x

By Bz

,

we obtain

µ

0

µ

φ

2

t2

+ γ

m

t

+ ω

2pm

H

=

2

t2

+ γ

m

t

+ ω

2pm

MAB

+ µ

φ

2

t2

+ γ

m

t

MBB

,

(13)

where

µ

0 is the permeability in air,

ω

pm and

γ

m are the magnetic plasma and collision frequencies of the material, respectively, andH

= (

Hx

,

Hy

,

Hz

)

andB

= (

Bx

,

By

,

Bz

)

denote the magnetic field and magnetic flux density, respectively.

In summary, coupling the constitutive equations(11)and(13)with the Faraday’s Law, Ampere’s Law, we obtain the governing equations for modeling the ideal spherical cloak:

Bt

= −∇ ×

E

,

(14)

Dt

= ∇ ×

H

,

(15)

ϵ

0

ϵ

φ

(

Et2

+ γ

Et

+ ω

2pE

) =

MA

(

Dt2

+ γ

Dt

+ ω

2pD

) + ϵ

φMB

(

Dt2

+ γ

Dt

),

(16)

µ

0

µ

φ

(

Ht2

+ γ

mHt

+ ω

2pmH

) =

MA

(

Bt2

+ γ

mBt

+ ω

pm2 B

) + µ

φMB

(

Bt2

+ γ

mBt

),

(17) where for simplicity we denoteutkfor thekth derivative of a functionuwith respect tot. To complete the problem, we supplement(14)–(17)with the perfectly conduct (PEC) boundary condition

n

×

E

=

0 on

,

(18)

wherenis the outward unit normal vector to

Ω, and the initial conditions

B

(

x

,

0

) =

B0

(

x

),

D

(

x

,

0

) =

D0

(

x

),

E

(

x

,

0

) =

E0

(

x

),

H

(

x

,

0

) =

H0

(

x

), ∀

x

,

(19) whereB0

(

x

),

D0

(

x

),

E0

(

x

)

andH0

(

x

)

are some given functions, andΩdenotes the spherical shellR1

r

R2.

We like to remark that the PEC boundary condition is imposed on the inner boundary so that any object can be cloaked inside, since no wave can be penetrated into the inner sphere (the so-called cloaked region). The spherical shell is often called as the cloaking region. Outside the cloaking region is the free space, which is governed by the standard Maxwell’s equations in air. Note that with the choice

ω

p

= ω

pm

=

0

, γ = γ

m

=

0

, ϵ

φ

= µ

φ

=

1

,

and usage of the identityMA

+

MB

=

I,(16)–(17)are reduced to the simple constitutive identitiesD

= ϵ

0EandB

= µ

0H, i.e., the standard Maxwell’s equations in air are a special case of the spherical cloak modeling equations(14)–(17). This fact is used in the numerical simulation implementation (see [39,34,32]).

(5)

3. The well-posedness of the cloaking model

Before we prove the well-posedness of the model(14)–(19), we need the following property.

Lemma 3.1. (i) The matrix MAis symmetric and non-negative definite.

(ii)Under the constraint

1

< ϵ

φ

2

,

(20)

the matrix M

=

MA

+ ϵ

φMBis symmetric positive definite.

Proof. (i) By the definition ofMA, it is easy to see that for any vector

(

u

, v, w)

, we have

(

u

, v, w)

MA

u

w v

= (

cos2

θ

cos2

φ +

sin2

φ)

u2

2u

v

sin2

θ

sin

φ

cos

φ −

2u

w

sin

θ

cos

θ

cos

φ + (

cos2

θ

sin2

φ +

cos2

φ)v

2

2

vw

sin

θ

cos

θ

sin

φ + w

2sin2

θ

= (w

sin

θ

cos

φ −

ucos

θ)

2

+ (w

sin

θ

sin

φ − v

cos

θ)

2

+ (

usin

φ

sin

θ − v

cos

φ

sin

θ)

2

0

,

(21) which proves the non-negativeness ofMA.

(ii) Similarly, by the definitions ofMB, we have

(

u

, v, w)

MB

u

w v

=

u2sin2

θ

cos2

φ +

2u

v

sin2

θ

sin

φ

cos

φ +

2u

w

sin

θ

cos

θ

cos

φ +

2

vw

sin

θ

cos

θ

sin

φ + v

2sin2

θ

sin2

φ + w

2cos2

θ

= (

usin

θ

cos

φ + v

sin

θ

sin

φ)

2

+ (

usin

θ

cos

φ + w

cos

θ)

2

+ (v

sin

θ

sin

φ + w

cos

θ)

2

u2sin2

θ

cos2

φ − v

2sin2

θ

sin2

φ − w

2cos2

θ.

(22) Using the identities(21)–(22), and condition 1

< ϵ

φ

2, we obtain

(

u

, v, w)(

MA

+ ϵ

φMB

)

u

w v

> (w

sin

θ

cos

φ −

ucos

θ)

2

+ (w

sin

θ

sin

φ − v

cos

θ)

2

+ (

usin

φ

sin

θ − v

cos

φ

sin

θ)

2

+ (

usin

θ

cos

φ + v

sin

θ

sin

φ)

2

+ (

usin

θ

cos

φ + w

cos

θ)

2

+ (v

sin

θ

sin

φ + w

cos

θ)

2

− ϵ

φ

[

u2sin2

θ

cos2

φ + v

2sin2

θ

sin2

φ + w

2cos2

θ ]

=

u2

+ v

2

+ w

2

− (ϵ

φ

1

) [

u2sin2

θ

cos2

φ + v

2sin2

θ

sin2

φ + w

2cos2

θ ]

u2

(

1

sin2

θ

cos2

φ) + v

2

(

1

sin2

θ

sin2

φ) + w

2

(

1

cos2

θ) ≥

0

,

which shows the positive definiteness ofM. Note that we used(20)in the last step.

By the definition of

ϵ

φ, we see that the constraint(20)is equivalent toR2

2R1, which means that the cloaking region needs large enough. We are unsure if this constraint is necessary for the practical cloak, since the simulation of [34] is only carried out forR2

=

2R1. We like to remark that a similar restrictionb

>

2ais imposed in [40] for the cylindrical cloak obtained with the virtual space to physical space mappingr

= [

a

b

(

rb

2

) +

1

]

r

+

a, wherer

∈ [

0

,

b

]

. Hereaandbare the radii of the inner and outer circles.

To study the well-posedness, we need to introduce the functional spaces

H

(

curl

;

) = {

v

∈ (

L2

(

))

3

; ∇ ×

v

∈ (

L2

(

))

3

} ,

(23) H0

(

curl

;

) = {

v

H

(

curl

;

) ;

n

×

v

=

0on

} .

(24) Now we can prove the existence and uniqueness of the solution for our cloaking model. LetT

>

0 be the final simulation time for our model.

Theorem 3.1. Under the constraint(20)and the following assumptions:

E

(

x

,

0

),

Et

(

x

,

0

),

Et2

(

x

,

0

), ∇ ×

E

(

x

,

0

), ∇ ×

Et

(

x

,

0

) ∈ (

L2

(

))

3

,

H

(

x

,

0

),

Ht

(

x

,

0

),

Ht2

(

x

,

0

), ∇ ×

H

(

x

,

0

), ∇ ×

Ht

(

x

,

0

) ∈ (

L2

(

))

3

,

there exists a unique solution

(

E

(

x

,

t

),

H

(

x

,

t

)) ∈

C

( [

0

,

T

];

H0

(

curl

;

)) ×

C

( [

0

,

T

];

H

(

curl

;

))

.

(6)

Proof. Differentiating(11)with respect totand using(15), we obtain

ϵ

0

ϵ

φ

(

Et3

+ γ

Et2

+ ω

2pEt

) = (

MA

+ ϵ

φMB

)(

Dt3

+ γ

Dt2

) + ω

2pMADt

=

M

( ∇ ×

Ht2

+ γ ∇ ×

Ht

) + ω

2pMA

∇ ×

H

.

(25) Similarly, differentiating(13)with respect totand using(14), we obtain

µ

0

µ

φ

(

Ht3

+ γ

mHt2

+ ω

2pmHt

) = (

MA

+ ϵ

φMB

)(

Bt3

+ γ

mBt2

) + ω

2pmMABt

= −

M

( ∇ ×

Et2

+ γ

m

∇ ×

Et

) − ω

2pmMA

∇ ×

E

.

(26) For any functionu

(

t

)

defined fort

0, let us denote its Laplace transform byu

ˆ (

s

) =

L

(

u

) =

0 estu

(

t

)

dt. Taking the Laplace transform of(25)and(26), respectively, we obtain

ϵ

0

ϵ

φ

(

s3

+ γ

s2

+ ω

2ps

)

E

ˆ =

M

(

s2

+ γ

s

) ∇ × ˆ

H

+ ω

p2MA

∇ × ˆ

H

+

f0

(

s

),

(27)

µ

0

µ

φ

(

s3

+ γ

ms2

+ ω

2pms

)

H

ˆ = −

M

(

s2

+ γ

ms

) ∇ × ˆ

E

− ω

2pmMA

∇ × ˆ

E

+

g0

(

s

),

(28) wheref0

(

s

)

andg0

(

s

)

contain all the terms related to initial conditions and are given as:

f0

(

s

) = ϵ

0

ϵ

φ

[ (

s2

+ γ

s

+ ω

2p

)

E

(

0

) + (

s

+ γ )

Et

(

0

) +

Et2

(

0

) ] −

M

[ (

s

+ γ ) ∇ ×

H

(

0

) + ∇ ×

Ht

(

0

) ] ,

g0

(

s

) = µ

0

µ

φ

[ (

s2

+ γ

ms

+ ω

2pm

)

H

(

0

) + (

s

+ γ

m

)

Ht

(

0

) +

Ht2

(

0

) ] +

M

[ (

s

+ γ

m

) ∇ ×

E

(

0

) + ∇ ×

Et

(

0

) ] .

With the notationpe

(

s

) =

s3

+ γ

s2

+ ω

p2s,pm

(

s

) =

s3

+ γ

ms2

+ ω

2pms,Me

= (

s2

+ γ

s

)

M

+ ω

2pMA, andMm

= (

s2

+ γ

ms

)

M

+ ω

2pmMA, we can rewrite(27)and(28)as

ϵ

0

ϵ

φpe

(

s

)

E

ˆ =

Me

∇ × ˆ

H

+

f0

(

s

),

(29)

µ

0

µ

φpm

(

s

)

H

ˆ = −

Mm

∇ × ˆ

E

+

g0

(

s

).

(30) SubstitutingH

ˆ

of(30)into(29), we obtain

ϵ

0

µ

0

ϵ

φ

µ

φpe

(

s

)

E

ˆ =

Me

∇ ×

Mm

pm

(

s

) ∇ × ˆ

E

+

g0

(

s

)

pm

(

s

)

+ µ

0

µ

φf0

(

s

),

which can be rewritten as

ϵ

0

µ

0

ϵ

φ

µ

φpe

(

s

)

Me1E

ˆ + ∇ ×

Mm pm

(

s

) ∇ × ˆ

E

=

f0

(

s

),

(31)

where we denotef0

(

s

) = ∇ ×

g0(s)

pm(s)

+ µ

0

µ

φMe1f0

(

s

)

. Note that the invertibility ofMeis guaranteed byLemma 3.1.

Consider the weak formulation of(31): FindE

ˆ ∈

H0

(

curl

;

)

such that

ϵ

0

µ

0

ϵ

φ

µ

φpe

(

s

)(

Me1E

ˆ ,

φ)

+

Mm

pm

(

s

) ∇ × ˆ

E

, ∇ ×

φ

= (

f0

(

s

),

φ), (32)

holds true for anyφ

H0

(

curl

;

)

. The existence of a unique solutionE

ˆ ∈

H0

(

curl

;

)

of(32)is guaranteed by the Lax–Milgram lemma, since byLemma 3.1the matricesMeandMeare symmetric positive definite.

Using the factE

ˆ ∈

H0

(

curl

;

)

, it is easy to see that(29)implies

∇ × ˆ

H

L2

(

)

, and(30)impliesH

ˆ ∈

L2

(

)

. This proves the existence and uniqueness ofH

ˆ ∈

H

(

curl

;

)

. The inverse Laplace transforms of functionsE

ˆ

andH

ˆ

are solutions of the time-dependent problem(25)–(26). This completes the proof.

The rest of this section is devoted to the proof of a stability result for the spherical cloak model(11)–(19). The proof is composed of the following three lemmas.

Lemma 3.2.

ϵ

02

ϵ

φ2 4

( ∥

M1Et

2

+ ∥ ω

p

M1E

2

)(

t

) + ( ∥

MDt

2

+ ∥ ω

p

MAD

2

)(

t

)

≤ ϵ

02

ϵ

φ2 2

(

2

M1Et

2

+ ∥ ω

p

M1E

2

)(

0

) +

5 2

MDt

2

(

0

) +

2

∥ ω

p

MAD

2

(

0

) + ϵ

20

ϵ

2φ

2

t 0

[

5

M1Et2

2

+ (

2

+

4

γ

2

) ∥

M1Et

2

+

4

∥ ω

2p

M1E

2

]

dt

+

t 0

13

+ γ

2

2

MDt

2

+

1 2

∥ ω

p2

M1MAD

2

dt

.

(33)

Références

Documents relatifs

Another interesting case of global existence for (2) corresponding to large initial data but with special structure is the more classical case of axisymmetric solutions without

We now prove the existence of a stationary solution to (1.1) when the overall fragmentation rate a may be bounded for large sizes but does not decay to zero.. As in Lemma 7.1, the

However, when the complete haplotypes at these loci in family B6 were compared with those of the BBS I and BBSS families, little similarity was observed, although one allele in

While advertising permeates many aspects of our lives. how it is perceived to influence the choices we make around areas that can have a marked effect on our health has been

Design and methods: Peripheral blood mononuclear cells (PBMC) from 75 HIV-infected individuals at various stages of disease Wttt tested directly ex v;vo for T

The specter of right-wing extremism is haunting Europe today. Although the extreme right seemed to disappear along with Nazism and Fascism after the Second World War. it

— Well posedness in the Gevrey Classes of the Cauchy Problem for a Non Strictly Hyperbolic Equation with Coefficients Depending On Time, Ann.. — Two by two strongly hyperbolic systems

As we have seen in [5], [6], and [7], when the Rossby number ε goes to zero, the system is stabilized as its solutions go to the solutions of the quasigeostrophic model (We refer