نتایج جستجو برای: scheme
تعداد نتایج: 222639 فیلتر نتایج به سال:
Talent identification and training the athletes of the basic levels in track and field requires codifying a proper model like any other system so that any duplication is prevented as well as knowing the right path. The federation of track and field started to codify the national talent-identification scheme in track and field in 1385. Hence, the present studies track-and-field talent-identifi...
In this paper, the fractional--order form of three dimensional chemostat model with variable yields is introduced. The stability analysis of this fractional system is discussed in detail. In order to study the dynamic behaviours of the mentioned fractional system, the well known nonstandard (NSFD) scheme is implemented. The proposed NSFD scheme is compared with the forward Euler and ...
The paper is devoted to the study of Brenstien Polynomials and development of some new operational matrices of fractional order integrations and derivatives. The operational matrices are used to convert fractional order differential equations to systems of algebraic equations. A simple scheme yielding accurate approximate solutions of the couple systems for fractional differential equations is ...
In 2006, Espinola and Kirk made a useful contribution on combining fixed point theoryand graph theory. Recently, Reich and Zaslavski studied a new inexact iterative scheme for fixed points of contractive and nonexpansive multifunctions. In this paper, by using the main idea of their work and the idea of combining fixed point theory on intuitionistic fuzzy metric spaces and graph theory, ...
In Shamir threshold scheme one that is called dealer, chooses the key and then shares some partial information about it, called among the participants, secretly. In this paper, we use some numerical methods with piecewise constant basis functions in Shamir threshold scheme. We first introduce operational matrix of this functions and then show how dealer multiplies this matrix by vector of share...
Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme ...
A Second-order Well-balanced Positivity Preserving Central-upwind Scheme for the Saint-venant System
A family of Godunov-type central-upwind schemes for the Saint-Venant system of shallow water equations has been first introduced in [A. Kurganov and D. Levy, M2AN Math. Model. Numer. Anal., 36, 397-425, 2002]. Depending on the reconstruction step, the second-order versions of the schemes there could be made either well-balanced or positivity preserving, but fail to satisfy both properties simul...
We introduce new Godunov-type semidiscrete central schemes for hyperbolic systems of conservation laws and Hamilton–Jacobi equations. The schemes are based on the use of more precise information about the local speeds of propagation and can be viewed as a generalization of the schemes from [A. Kurganov and E. Tadmor, J. Comput. Phys., 160 (2000), pp. 241–282; A. Kurganov and D. Levy, SIAM J. Sc...
We present a theoretical solution for the Riemann problem for the five-equation two-phase non-conservative model of Saurel and Abgrall. This solution is then utilized in the construction of upwind non-conservative methods to solve the general initial-boundary value problem for the two-phase flow model in non-conservative form. The basic upwind scheme constructed is the non-conservative analogue...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید