An Algebraic Approach to Guarantee Harmonic Balance Method Using Grobner Base
نویسندگان
چکیده
منابع مشابه
An Algebraic Approach to Guarantee Harmonic Balance Method Using Gröbner Base
Harmonic balance (HB) method is well known principle for analyzing periodic oscillations on nonlinear networks and systems. Because the HB method has a truncation error, approximated solutions have been guaranteed by error bounds. However, its numerical computation is very time-consuming compared with solving the HB equation. This paper proposes an algebraic representation of the error bound us...
متن کاملThe Harmonic Balance Method
The harmonic balance method is used in most current commercial RF simulation tools. This is due to the fact that it has certain advantages over other common methods used in SPICE, namely (modified) nodal analysis (MNA), which make it better suited to simulate stiff problems and circuits containing transmission lines, nonlinearities and dispersive effects. In this project, the harmonic balance a...
متن کاملRotor Flow Analysis using Animplicit Harmonic Balance Method
This paper is an extension of a previous work where a diagonally implicit harmonic balance method was developed and applied to simulate oscillatory motions of pitching airfoil and wing. A more detailed study on the accuracy, convergence, and the efficiency of the method is carried out in the current paperby varying the number of harmonics in the solution approximation. As the main advantage of ...
متن کاملAn algebraic approach for finding balance index sets
Any vertex labeling f : V → {0, 1} of the graph G = (V,E) induces a partial edge labeling f ∗ : E → {0, 1} defined by f ∗(uv) = f(u) if and only if f(u) = f(v). The balance index set of G is defined as {|f ∗−1(0)− f ∗−1(1)| ∣∣ |f−1(0) − f−1(1)| ≤ 1}. In this paper, we propose a new and easier approach to find the balance index set of a graph. This new method makes it possible to determine the b...
متن کاملKnowledge Base Distortion to Guarantee Data Privacy
The problem of data privacy is to verify that confidential information stored in an information system is not provided to unauthorized users and, therefore, personal and other sensitive data remain private. One way to guarantee this is to distort a knowledge base such that it does not reveal sensitive information. In the present paper we will give a definition of the problem of knowledge base d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
سال: 2008
ISSN: 0916-8508,1745-1337
DOI: 10.1093/ietfec/e91-a.9.2442