نتایج جستجو برای: order hybrid scheme

تعداد نتایج: 1259826  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علم و صنعت ایران - دانشکده مهندسی عمران 1385

در این تحقیق شبیه سازی عددی غلظت رسوب در حوضچه های ته نشینی به منظور طراحی حوضچه های ته نشینی با در نظر گرفتن آشفتگی صورت گرفته است کلیه معادلات در حالت دایمی حل شده اند. معادلات حاکم شامل معادلات پیوستگی اندازه حرکت و انتقال انتشار رسوب می باشند برای شبیه سازی آشفتگی از مدل دو معادله ای 3-k استفاده شده است گسسته سازی معادلات فوق بر مبنای روش احجام حدود با استفاده از دو طرح پیوندی hybrid و اختل...

Journal: :Electr. Notes Theor. Comput. Sci. 2007
Dirk A. van Beek J. E. Rooda Ramon R. H. Schiffelers Ka Lok Man Michel A. Reniers

The hybrid χ (Chi) formalism is suited to modeling, simulation and verification of hybrid systems. It integrates concepts from dynamics and control theory with concepts from computer science, in particular from process algebra and hybrid automata. In this paper, we first provide an overview of χ. Then, the χ formalism is related to other formalisms by means of translation schemes: a translation...

2012
Yiqing Shen Gecheng Zha Guowei Yang Zhi Gao

In order to simulate accurately the interaction of shock wave/complex flows, hybrid schemes combining the compact scheme and weighted essentially non-oscillatory(WENO) scheme are beneficial, especially the high order low diffusion schemes used in smooth regions. There are two key issues, one is how to detect the discontinuity, the other is how to choose the high order low diffusion scheme to en...

M. Mosleh M. Othadi,

The hybrid fuzzy differential equations have a wide range of applications in science and engineering. We consider the problem of nding their numerical solutions by using a novel hybrid method based on fuzzy neural network. Here neural network is considered as a part of large eld called neural computing or soft computing. The proposed algorithm is illustrated by numerical examples and the result...

2015
Svyatoslav I. Solodushkin Arsen A. Sagoyan Irina F. Iumanova

We describe a parallel implementation of a difference scheme for the advection equation with time delay on a hybrid architecture computation system. The difference scheme has the second order in space and the first order in time and is unconditionally stable. Performance of a sequential algorithm and several parallel implementations with the MPI technology in the C++ language has been studied.

Journal: :J. Comput. Physics 2013
Khosro Shahbazi Jan S. Hesthaven Xueyu Zhu

We introduce a multi-dimensional point-wise multi-domain hybrid Fourier-Continuation/WENO technique (FC-WENO) that enables high-order and non-oscillatory solution of systems of nonlinear conservation laws, and essentially dispersionless, spectral, solution away from discontinuities, as well as mild CFL constraints for explicit time stepping schemes. The hybrid scheme conjugates the expensive, s...

2012
Yeonseung Ryu

Recently DRAM and PRAM hybrid main memory organization has been studied in order to address the high levels of energy dissipation in DRAM based main memory. It is expected that this new memory architecture will be used soon in mobile computers which use NAND Flash memory based storages. In such computers, legacy operating system functionalities like file system and memory system should be modif...

Journal: :international journal of robotics 0
mohammad ali nekoui k.n. toosi university of technology

this paper proposes a hybrid control scheme for the synchronization of two chaotic duffing oscillator system, subject to uncertainties and external disturbances. the novelty of this scheme is that the linear quadratic regulation (lqr) control, sliding mode (sm) control and gaussian radial basis function neural network (grbfnn) control are combined to chaos synchronization with respect to extern...

2005
Alexander W. Dent

This paper expands the notion of a KEM–DEM hybrid encryption scheme to the signcryption setting by introducing the notion of a signcryption KEM, a signcryption DEM and a hybrid signcryption scheme. We present the security criteria that a signcryption KEM and DEM must satisfy in order that the overall signcryption scheme is secure against outsider attacks. We also present ECISS–KEM — a simple, e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید