ar X iv : m at h / 04 06 51 6 v 1 [ m at h . N A ] 2 5 Ju n 20 04 DUAL SCATTERING CHANNEL SCHEMES AND TRANSMISSION LINE METHODS
نویسندگان
چکیده
Dual scattering channel (DSC) schemes naturally extend the transmission line matrix (TLM) numerical method beyond the lines set up by P.B. Johns and coworkers. Conceptually, DSC schemes retain from TLM the typical formal splitting of the computed fields into incident and reflected components, interchanged and scattered between adjacent cells, without yet a need for transmission lines. They generally admit nontrivial cell interface scattering and so release from a set of modeling limitations to that the classical TLM method is subject. The elements characterizing DSC schemes are outlined and illustrated by coupling within a non-orthogonal mesh a model of heat propagation to a lossy Maxwell field. Westerham on May 16, 2008 Life is not an illogicality; yet it is a trap for logicians. It looks just a little more mathematical and regular than it is. Gilbert Keith Chesterton
منابع مشابه
. N A ] 3 0 Ju n 20 04 DUAL SCATTERING CHANNEL SCHEMES AND TRANSMISSION LINE METHODS
Dual scattering channel (DSC) schemes naturally extend the transmission line matrix (TLM) numerical method beyond the lines set up by P.B. Johns and coworkers. Conceptually, DSC schemes retain from TLM the typical formal splitting of the computed fields into incident and reflected components, interchanged and scattered between adjacent cells, without yet a need for transmission lines. They gene...
متن کاملar X iv : 0 81 1 . 04 65 v 1 [ m at h . A P ] 4 N ov 2 00 8 Spurious caustics of Dispersion Relation Preserving schemes
A linear dispersive mechanism leading to a burst in the L∞ norm of the error in numerical simulation of polychromatic solutions is identified. This local error pile-up corresponds to the existence of spurious caustics, which are allowed by the dispersive nature of the numerical error. From the mathematical point of view, spurious caustics are related to extrema of the numerical group velocity a...
متن کاملar X iv : q ua nt - p h / 03 11 00 6 v 1 3 N ov 2 00 3 Continuous - variable quantum cryptography is secure against non - gaussian attacks
A general study of arbitrary finite-size coherent attacks against continuous-variable quantum cryptographic schemes is presented. It is shown that, if the size of the blocks that can be coherently attacked by an eavesdropper is fixed and much smaller than the key size, then the optimal attack for a given signal-to-noise ratio in the transmission line is an individual gaussian attack. Consequent...
متن کامل1 6 Se p 20 03 DUAL SCATTERING CHANNEL SCHEMES EXTENDING THE JOHNS ALGORITHM
Dual scattering channel schemes extend the transmission line matrix numerical method (Johns’ TLM algorithm) in two directions. For one point, transmission line links are replaced by abstract scattering channels in terms of paired distributions (characteristic impedances are thus neither needed, nor in general defined, e.g.). In the second place, non-trivial cell interface scattering is admitted...
متن کاملInterference Resilience of Burst-by-burst Adaptive Modems
Adapt ive modula t ion can achieve channel capacity gains b y adap t ing t h e n u m b e r of b i t s p e r transmission symbol o n a burst-by-burst basis, in ha rmony w i t h channel quali ty fluctuations. I n th is t rea t i se the i r interference resilience is quantified a n d t h e modem mode switching levels a r e de termined und e r interfered conditions. T h e associated performance cur...
متن کامل