نتایج جستجو برای: characteristic based scheme

تعداد نتایج: 3187217  

2007
Kazuya Shiraishi Toshifumi Matsuoka

We apply the CIP (Cubic Interpolated Profile) scheme to the numerical simulation of the acoustic wave propagation based on characteristic equations.The CIP scheme is based on a concept that both the wavefield and its spatial derivative propagate along the same characteristic curves derived from a hyperbolic differential equation. We describe the derivation of the characteristic equations for th...

پایان نامه :0 1374

this study focuses on jane austens representation of her heroines in two of her novels: pride and prejudice, and mansfield park. i have concentrated only on a single idea: how jane austen takes her heroines through a course of psychogical reformation to which almost everything else in her novel is subsidiary. although i have discussed only pride and prejudice, we can trace austens carefully pla...

2013
Yang Shi Guoyue Xiong

Based on analysis of security problems from malicious hosts, a special undetachable threshold digital signature scheme is proposed. This scheme uses a cryptosystem based on conic curves and achieves the most important security characteristic of protecting mobile agents against malicious hosts, that is, undetachability. Furthermore, this scheme solves the case where a host can force an agent to ...

Journal: :international journal of communications and information technology 2011
j. ayubi f. mohanna s. mohanna m. rezaei

a watermarking scheme for grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. jacobian elliptic mapis employed to encrypt ofwatermarked logo. piecewise nonlinear chaotic map is also usedto determine the location of dct coefficients for the watermarkembedding. the purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...

Ali Saeidi Rashkolia Masoud Hadian Dehkordi Mohammad Mahdi Zahedi,

In this paper,we introduce a new verifiable multi-use multi-secretsharing scheme based on automata and one-way hash function. The scheme has theadversary fuzzy structure and satisfy the following properties:1) The dealer can change the participants and the adversary fuzzy structure without refreshing any participants' real-shadow. 2) The scheme is based on the inversion of weakly invertible fin...

Objective(s): Positron emission tomography/computed tomography (PET/CT) examination is commonly used for the evaluation of pulmonary nodules since it provides both anatomical and functional information. However, given the dependence of this evaluation on physician’s subjective judgment, the results could be variable. The purpose of this study was to develop an automated scheme for the classific...

2003
Stephan Blazy Oliver Marquardt

In this paper we consider a finite element algorithm solving the three dimensional Navier-Stokes equation using the method of characteristics. The algorithm is based on a splitting scheme using a characteristic pressure correction method. It’s well known, that the most expensive part of the characteristic integration scheme consists of the search for the volume that contains the foot of a given...

1997
C. Zoppou S. Roberts

This paper demonstrates the use of shape-preserving exponential interpolation in a characteristic based numerical scheme for the solution of the linear advective-diiusion equation. The results from this scheme are compared with results from a number of numerical schemes in current use using test problems in one-and two-dimensions. These test cases are used to assess the merits of using shape-pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید