Frequency‐dependent finite‐difference time‐domain method based on iterated Crank–Nicolson scheme
نویسندگان
چکیده
The finite-difference time-domain (FDTD) method based on the iterated Crank–Nicolson (ICN) scheme is extended to a frequency-dependent version. Drude model used express metal dispersion, which incorporated into formulation with trapezoidal recursive convolution technique. validity of present convolutional perfectly matched layers discussed through analysis metal-insulator-metal plasmonic waveguide. Numerical results obtained from two-iteration technique are found agree well those traditional explicit method.
منابع مشابه
Signature Identification Scheme Based on Iterated Function Systems
Since 1984 many schemes have been proposed for digital signature protocol, among them those that based on discrete log and factorizations. However a new identification scheme based on iterated function (IFS) systems are proposed and proved to be more efficient. In this study the proposed identification scheme is transformed into a digital signature scheme by using a one way hash function. It is...
متن کاملIterative scheme based on boundary point method for common fixed point of strongly nonexpansive sequences
Let $C$ be a nonempty closed convex subset of a real Hilbert space $H$. Let ${S_n}$ and ${T_n}$ be sequences of nonexpansive self-mappings of $C$, where one of them is a strongly nonexpansive sequence. K. Aoyama and Y. Kimura introduced the iteration process $x_{n+1}=beta_nx_n+(1-beta_n)S_n(alpha_nu+(1-alpha_n)T_nx_n)$ for finding the common fixed point of ${S_n}$ and ${T_n}$, where $uin C$ is ...
متن کاملWatermarking Scheme Based on Multiple Chaotic Maps
a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...
متن کاملA Network Anomaly Detection Method Based on Transduction Scheme
Network anomaly detection has been an active and difficult research topic in the field of intrusion detection for many years. Up to now, high false alarm rate, requirement of high quality data for modeling the normal patterns and the deterioration of detection rate because of some “noisy” data in the training set still make it not perform as well as expected in practice. This paper presents a n...
متن کاملConfidence Intervals for Lower Quantiles Based on Two-Sample Scheme
In this paper, a new two-sampling scheme is proposed to construct appropriate confidence intervals for the lower population quantiles. The confidence intervals are determined in the parametric and nonparametric set up and the optimality problem is discussed in each case. Finally, the proposed procedure is illustrated via a real data set.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics Letters
سال: 2022
ISSN: ['0013-5194', '1350-911X']
DOI: https://doi.org/10.1049/ell2.12695