نتایج جستجو برای: characteristic based scheme

تعداد نتایج: 3187217  

Journal: :Journal of the Atomic Energy Society of Japan / Atomic Energy Society of Japan 1992

Journal: :iranian journal of science and technology (sciences) 2014
a. r. soheili

this paper introduces a mesh generating algorithm for solving the traffic flow equation as a conservation law equation. the idea behind the new method is to use the characteristic curves and moving non-oscillatory finite volume method. in addition, when characteristic curves intersect, the proposed scheme uses shock speed equation in order to improve computational efficiency. we also compare...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1382

‏‎the main purpose of this research was to:1.develop a coking model for thermal cracking of naphtha.2.study coke inhibition methods using different coke inhibitors.developing a coking model in naphtha cracking reactors requires a suitable model of the thermal cracking reactor based on a reliable kinetic model.to obtain reliable results all these models shall be solved simultaneously.for this pu...

2017
P. LIN K. W. MORTON E. SÜLI

— This paper describes a gênerai formulation of the Euler Characteristic Galerkin (ECG) scheme for scalar conservation laws, based on the theory of the Riemann-Stieltjes intégral. The ECG scheme is proved to be equivalent to the projection of Brenier' s transportcollapse operator. For the purpose of getting higher order accuracy, we explore two recovery procedures, namely continuous linear reco...

M. Y. Hashemi

In this paper, the laminar incompressible flow equations are solved by an upwind least-squares meshless method. Due to the difficulties in generating quality meshes, particularly in complex geometries, a meshless method is increasingly used as a new numerical tool. The meshless methods only use clouds of nodes to influence the domain of every node. Thus, they do not require the nodes to be conn...

2015
Junyao Ye Fang Ren Dong Zheng Kefei Chen

Cryptography based on the theory of error correcting codes and lattices has received a wide attention in the last years. Shor’s algorithm showed that in a world where quantum computers are assumed to exist, number theoretic cryptosystems are insecure. Therefore, it is important to design suitable, provably secure post-quantum signature schemes. Code-based public key cryptography has the charact...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید