Results 21 to 30 of about 603,354 (281)

Fitted finite difference method for third order singularly perturbed convection diffusion equations with integral boundary condition

open access: yesArab Journal of Mathematical Sciences, 2019
A class of third order singularly perturbed convection diffusion type equations with integral boundary condition is considered. A numerical method based on a finite difference scheme on a Shishkin mesh is presented.
Velusamy Raja, Ayyadurai Tamilselvan
doaj   +1 more source

On the fundamental group scheme of rationally chain connected varieties [PDF]

open access: yes, 2015
Let $k$ be an algebraically closed field. Chambert-Loir proved that the \'etale fundamental group of a normal rationally chain connected variety over $k$ is finite. We prove that the fundamental group scheme of a normal rationally chain connected variety
Antei, Marco, Biswas, Indranil
core   +4 more sources

WENO Scheme Based on Lax-Wendroff Time Discretization to Solving Hyperbolic Conservation Laws

open access: yesJournal of Harbin University of Science and Technology, 2017
The research of high accuracy and high resolution schemes have been a hot topic in computational mathematics. According to low resolution and large amount of calculation of the original WENO-JS scheme,we propose a simple new limiter fifth order upwind ...
LI Xing-hua, SUN Yang, AI Xiao-hui
doaj   +1 more source

Design and evaluation of module configuration scheme for special machine tool of variable hyperbolic circular-arc-tooth-trace cylindrical gear

open access: yesAdvances in Mechanical Engineering, 2022
In the design and evaluation process of the module configuration for the special machine tool of variable hyperbolic circular-arc-tooth-trace cylindrical gear, the similar coefficient of each module attribute is calculated by using fuzzy mathematics ...
Haiyan Zhang   +5 more
doaj   +1 more source

Novel Precise Solitary Wave Solutions of Two Time Fractional Nonlinear Evolution Models via the MSE Scheme

open access: yesFractal and Fractional, 2022
We construct soliton solutions of the complex time fractional Schrodinger model (tFSM), as well as the space–time fractional differential model (stFDM), leading wave spread through electrical transmission lines model (ETLM) in low pass with the help of ...
Zillur Rahman   +3 more
doaj   +1 more source

A Probabilistic Numerical Method for Fully Nonlinear Parabolic PDEs

open access: yes, 2009
We consider the probabilistic numerical scheme for fully nonlinear PDEs suggested in \cite{cstv}, and show that it can be introduced naturally as a combination of Monte Carlo and finite differences scheme without appealing to the theory of backward ...
Fahim, Arash   +2 more
core   +4 more sources

Cubic B-spline quasi-interpolation and an application to numerical solution of generalized Burgers-Huxley equation

open access: yesAdvances in Mechanical Engineering, 2020
Nonlinear partial differential equations are widely studied in Applied Mathematics and Physics. The generalized Burgers-Huxley equations play important roles in different nonlinear physics mechanisms.
Lan-Yin Sun, Chun-Gang Zhu
doaj   +1 more source

Local existence and uniqueness for the non-resistive MHD equations in homogeneous Besov spaces

open access: yes, 2017
In the paper, we consider the Cauchy problem of the non-resistive MHD equations in homogeneous Besov spaces. We prove the local existence and uniqueness of the solution to the non-resistive MHD equations by using the iterative scheme and compactness ...
Li, Jinlu, Tan, Wenke, Yin, Zhaoyang
core   +1 more source

The fault diagnosis system based on graph theory and fuzzy mathematics

open access: yes浙江大学学报. 农业与生命科学版, 2001
A minimal cost fault diagnosis mathematics model based on a fuzzy weighted bipartite graph for the single-input fault diagnose problem was put forward, and two effective algorithms for it was given.
GE Xiao-feng, CHEN Su-shan, HE Yong
doaj   +1 more source

Large-capacity information hiding scheme based on minimum pixel modification

open access: yesEgyptian Informatics Journal, 2022
Information hiding is an important technique for security-related applications, and it can be used wildly in many scenarios. Secret data embedding methods are proposed in spatial, frequency, and other domains by researchers in recent years.
Zhang Yu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy