نتایج جستجو برای: method of fundamental solutions

تعداد نتایج: 21303368  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان 1390

in iran we already use laminate tubes only in cosmetics industry. laminate tube manufacturers via using the most modern technology of the world, faced with the laminate tube market being saturated in cosmetics industry for packaging the cosmetic creams and toothpaste. but considering the great food market and therefore laminate tube features such as beautiful packaging, ease of use for the fina...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده روانشناسی و علوم تربیتی 1391

the purpose of this study was the relationship between problem – solvi ability with fdi cognitive style of students.the research method was correlation method. for data analysis pearson test was used. statistical society in this research was all the students of alligoodarz city in 1391-92 year.to sampling of statiscal population was used sampling multi-stage random the size of sample selected 2...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم 1391

in this research we have studied the effect of some transition-metals (cu, ag and au) substitutions on two-electron reduction potential of flavins by application of dft method. all geometries have been optimized at blyp level of theory and “6-31+g** + lanl2dz” mixed basis set. the frequency job at the same method and basis sets has been performed to obtain gibbs free energy of compounds. it h...

Journal: :Math. Comput. 2009
Yiorgos Sokratis Smyrlis

In the present work, we investigate the applicability of the method of fundamental solutions for the solution of boundary value problems of elliptic partial differential equations and elliptic systems. More specifically, we study whether linear combinations of fundamental solutions can approximate the solutions of the boundary value problems under consideration. In our study, the singularities ...

2002
P. A. Ramachandran

The method of fundamental solutions (also known as the singularity or the source method) is a useful technique for solving linear partial di erential equations such as the Laplace or the Helmholtz equation. The procedure involves only boundary collocation or boundary tting and hence is a very fast procedure for the solution of these classes of problems. The resulting coe cient matrix, is howeve...

2002
Andreas Poullikkas Andreas Karageorghis Georgios Georgiou

We consider the application of the method of fundamental solutions to isotropic elastostatics problems in three space dimensions. The displacements are approximated by linear combinations of the fundamental solutions of the Cauchy–Navier equations of elasticity, which are expressed in terms of sources placed outside the domain of the problem under consideration. The final positions of the sourc...

2005
S. P. Hu C. M. Fan C. W. Chen D. L. Young

This paper describes the applications of the method of fundamental solutions (MFS) as a mesh-free numerical method for the Stokes’ first and second problems which prevail in the semi-infinite domain with constant and oscillatory velocity at the boundary in the fluid-mechanics benchmark problems. The time-dependent fundamental solutions for the semi-infinite problems are used directly to obtain ...

2010
W. Chen

This paper proposes a novel meshless boundary method called the singular boundary method (SBM). This method is mathematically simple, easy-to-program, and truly meshless. Like the method of fundamental solutions (MFS), the SBM employs the singular fundamental solution of the governing equation of interest as the interpolation basis function. However, unlike the MFS, the source and collocation p...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید