نتایج جستجو برای: out scheme
تعداد نتایج: 1018417 فیلتر نتایج به سال:
over the last ten years, robustness of schemes has raised an increasing interest among the cfd community. the objective of this article is to solve the quasi-one-dimensional compressible flow inside a “shubin nozzle” and to investigate bean-warming and flux vector splitting methods for numerical solution of compressible flows. two different conditions have been considered: first, there is a sup...
Put options are commonly used in the stock market to protect against the decline of the price of a stock below a specified price. On the other hand, finite difference approach is a well-known and well-resulted numerical scheme for financial differential equations. As such in this work, a new spatial discretization based on finite difference semi-discretization procedure with high order of accur...
a nonstandard finite difference (nsfd) scheme has been constructed and analyzed for a mathematical model that describes lotka–volterra food web model. this new discrete system has the same stability properties as the continuous model and,on the whole, it preservesthe same local asymptotic stability properties. linearized stability theory and schur–cohn criteria are used for local asymptoticstab...
یکی از مسائل مهم در مهندسی منابع آب، بررسی مکانیزم انتقال و پخش آلودگی در آب های سطحی است. در چند دهه اخیر روش های مختلفی بر اساس مشاهدات میدانی، مدل های آزمایشگاهی، روشهای تحلیلی و مجموعه وسیعی از مدل های عددی، در جهت توصیف و پیش بینی حرکت آلودگی در منابع آب های سطحی توسعه یافته اند. مدل های ریاضی با کاهش زمان و هزینه های که صرف کار-های آزمایشگاهی می شود و همچنین قابلیت تکرار پذیری بالا، این ا...
In 2000, Hwang and Li proposed a new remote user authentication scheme using smart cards. In the same year, Chan and Cheng pointed out that Hwang and Li’s scheme is not secure against the masquerade attack. Further, in 2003, Shen, Lin and Hwang pointed out a different type of attack on Hwang and Li’s scheme and presented a modified scheme to remove its security pitfalls. This paper presents an ...
We first give an analysis on Zhang et al.’s attack on a short signature scheme so called ZCSM scheme and point out their forgery attack is not correct one. Furthermore, we present a forgery attack under the chosen message and public key attacks on ZCSM scheme, in the sense of Zhang et al.’s attack. We also analyze Zhang et al.’s improved signature scheme suggested to resist their attacks and po...
Let $X$ be a sufficiently nice scheme. We survey some recent progress on dualizing complexes. It turns out that a complex in $kinj X$ is dualizing if and only if tensor product with it induces an equivalence of categories from Murfet's new category $kmpr X$ to the category $kinj X$. In these terms, it becomes interesting to wonder how to glue such equivalences.
This short note points out an improvement on the robust stability analysis for electrically driven robots given in the paper. In the paper, the author presents a FAT-based direct adaptive control scheme for electrically driven robots in presence of nonlinearities associated with actuator input constraints. However, he offers not suitable stability analysis for the closed-loop system. In other w...
This short note points out an improvement on the robust stability analysis for electrically driven robots given in the paper. In the paper, the author presents a FAT-based direct adaptive control scheme for electrically driven robots in presence of nonlinearities associated with actuator input constraints. However, he offers not suitable stability analysis for the closed-loop system. In other w...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید