Frequency‐dependent finite‐difference time‐domain method based on iterated Crank–Nicolson scheme

نویسندگان

چکیده

The finite-difference time-domain (FDTD) method based on the iterated Crank–Nicolson (ICN) scheme is extended to a frequency-dependent version. Drude model used express metal dispersion, which incorporated into formulation with trapezoidal recursive convolution technique. validity of present convolutional perfectly matched layers discussed through analysis metal-insulator-metal plasmonic waveguide. Numerical results obtained from two-iteration technique are found agree well those traditional explicit method.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Signature Identification Scheme Based on Iterated Function Systems

Since 1984 many schemes have been proposed for digital signature protocol, among them those that based on discrete log and factorizations. However a new identification scheme based on iterated function (IFS) systems are proposed and proved to be more efficient. In this study the proposed identification scheme is transformed into a digital signature scheme by using a one way hash function. It is...

متن کامل

Iterative scheme based on boundary point method for common fixed‎ ‎point of strongly nonexpansive sequences

Let $C$ be a nonempty closed convex subset of a real Hilbert space $H$. Let ${S_n}$ and ${T_n}$ be sequences of nonexpansive self-mappings of $C$, where one of them is a strongly nonexpansive sequence. K. Aoyama and Y. Kimura introduced the iteration process $x_{n+1}=beta_nx_n+(1-beta_n)S_n(alpha_nu+(1-alpha_n)T_nx_n)$ for finding the common fixed point of ${S_n}$ and ${T_n}$, where $uin C$ is ...

متن کامل

Watermarking Scheme Based on Multiple Chaotic Maps

a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...

متن کامل

A Network Anomaly Detection Method Based on Transduction Scheme

Network anomaly detection has been an active and difficult research topic in the field of intrusion detection for many years. Up to now, high false alarm rate, requirement of high quality data for modeling the normal patterns and the deterioration of detection rate because of some “noisy” data in the training set still make it not perform as well as expected in practice. This paper presents a n...

متن کامل

Confidence Intervals for Lower Quantiles Based on Two-Sample Scheme

In this paper, a new two-sampling scheme is proposed to construct appropriate confidence intervals for the lower population quantiles. The confidence intervals are determined in the parametric and nonparametric set up and the optimality problem is discussed in each case. Finally, the proposed procedure is illustrated via a real data set. 

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics Letters

سال: 2022

ISSN: ['0013-5194', '1350-911X']

DOI: https://doi.org/10.1049/ell2.12695