Nonlinear Homogenization Algorisms with Low Computational cost
نویسندگان
چکیده
منابع مشابه
Homogenization of Some Low-Cost Control Problems
The aim of this article is to study the asymptotic behaviour of some low-cost control problems. These problems motivate the study of H-convergence with weakly converging data. An improved lower bound for the limit of energy functionals corresponding to weak data is established, in the periodic case. This fact is used to prove the Γconvergence of a low-cost problem with Dirichlet-type integral. ...
متن کاملPrediction of accurate pKa values of some α-substituted carboxylic acids with low cost of computational methods
The acidity constants (pKa) of thirty four (34) ;-substituted carboxylic acids in aqueous solution havebeen calculated using conductor-like polarizable continuum (C-PCM) solvation model. The gasphaseenergies at the Density Functional Theory (DFT-MPW1PW91) and solvation energies atHartree Fock (HF) are combined to estimate the pKa values which are very close to the experimentalvalues where, and ...
متن کاملAn Event-Based PID Controller With Low Computational Cost
In this paper, some improvements of event-based PID controllers are proposed. These controllers, contrary to a time-triggered one which calculates the control signal at each sampling time, calculate the new control signal only when the measurement signal sufficiently changes. The contribution of this paper is a low computational cost scheme thanks to a minimum sampling interval condition. Moreo...
متن کاملBroadband frequency invariant beamforming method with low computational cost
This paper presents a method for reducing the computational complexity required for farfield broadband beamforming. First, the propagating wave received by a linear or planar array of sensors is sampled efficiently on the multidimensional frequency plane in spatio-temporal sense so that the so-called non-physical area where no spectrum exists is filled with aliasing component. Next, the derived...
متن کاملLow computational cost integrity for block ciphers
Encryption algorithms supply confidentiality to communications between parties. However, only under certain circumstances, encryption might also supply integrity validation. For those situations, where encryption algorithms do not supply any integrity protection, additional mechanisms must be implemented (hash functions, digital signature). In this way, many solutions have been proposed in the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: TRANSACTIONS OF THE JAPAN SOCIETY OF MECHANICAL ENGINEERS Series A
سال: 2008
ISSN: 0387-5008,1884-8338
DOI: 10.1299/kikaia.74.191