نتایج جستجو برای: nicolsons scheme
تعداد نتایج: 222639 فیلتر نتایج به سال:
In this paper, we consider a second-order singularly perturbed differential-difference equations with mixed delay and advance parameters. At first, we approximate the model problem by an upwind finite difference scheme on a Shishkin mesh. We know that the upwind scheme is stable and its solution is oscillation free, but it gives lower order of accuracy. So, to increase the convergence, we propo...
The coast of Bangladesh has a specialty in terms of high bending and many off- shore islands. Incorporation of the coastline and island boundaries properly in the numerical scheme is essential for accurate estimation of water levels due to surge. For that purpose a numerical scheme consisting of very fine mesh is required along the coastal belt, whereas this is unnecessary away from the coast. In...
A sequential implicit numerical scheme is proposed for a system of partial differential equations defining the transport of heat and mass in the channel flow of a variable-viscosity fluid. By adopting the backward difference scheme for time derivative and the central difference scheme for the spatial derivatives, an implicit finite difference scheme is formulated. The variable-coefficient diffu...
â performance and capacity of sulfur recovery unit (sru) are greatly affected by the h2s:co2 ratio of the acid gas stream. the acid gases in iran contain around 35 mol% h2s and 60 mol% co2. this low concentration of h2s calls for more complex sulfur plant, larger equipments, and higher costs. acid gas enrichment processes (age) is run to upgrade low quality acid gas collected from gas treating...
The identification protocol is a type of zero-knowledge proof. One party (the prover) needs to prove his identity another verifier) without revealing the secret key verifier. can apply Fiat–Shamir transformation convert an scheme into signature which be used for achieving security purposes and cryptographic purposes, especially authentication. In this paper, we recall protocol, namely RankID sc...
abstract employees always concern about losing their job, or in other word, losing their income resources. for this purpose, governments require strong protection system for covering these concerns. the unemployment insurance (ui) program’s can be used for achieving this goal. based on article five of iranian unemployment insurance law, premium is four percent of employee’s salary while emplo...
this work is a primary achievement in studying the co2 and n2–oil systems. to predict gas-liquid relative permeability curves, a shan-chen type multicomponent multiphase lattice boltzmann model for two-phase flow through 2d porous media is developed. periodic and bounce back boundary conditions are applied to the model with the guo scheme for the external body force (i.e., the pressure gradient...
The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that the scheme is vulnerable to attacks when not properly used. This paper describes an attack on t...
in this paper i develop a proxy means tests (pmt) model and examine several targeting lines based on 2008 household survey data to identify beneficiaries for a targeting subsidy scheme in iran. based on the findings of this study, setting a cut-off percentile of 40% is expected to provide compensation for almost 70 percent of the poorest households. this will result in the highest accuracy main...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید