Comparison of the Point-Collocation Non-Intrusive Polynomial (NIPC) and Non-Intrusive Spectral Projection (NISP) Methods for the γ-Rθ Transition Model

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparison of Non-Intrusive Polynomial Chaos and Stochastic Collocation Methods for Uncertainty Quantification

Non-intrusive polynomial chaos expansion (PCE) and stochastic collocation (SC) methods are attractive techniques for uncertainty quantification (UQ) due to their strong mathematical basis and ability to produce functional representations of stochastic variability. PCE estimates coefficients for known orthogonal polynomial basis functions based on a set of response function evaluations, using sa...

متن کامل

Multiscale Stochastic Preconditioners in Non-intrusive Spectral Projection

A preconditioning approach is developed that enables efficient polynomial chaos (PC) representations of uncertain dynamical systems. The approach is based on the definition of an appropriate multiscale stretching of the individual components of the dynamical system which, in particular, enables robust recovery of the unscaled transient dynamics. Efficient PC representations of the stochastic dy...

متن کامل

Intrusive and non-intrusive watermarking

“Can we watermark without perturbing an image?” We present the salient results of the investigation carried out to find an answer to this question.

متن کامل

Uncertainty Analysis for Parametric Roll Using Non-intrusive Polynomial Chaos

In this paper, uncertainty analysis is carried out on both a simple parametric roll model which can be modeled as a Mathieu equation and a 1.5 degree-of-freedom parametric roll model in regular seas. For both cases, the uncertainty is brought into the system due to the error in predicting the damping coefficients. The non-intrusive polynomial chaos method has been used to assess how the paramet...

متن کامل

Non-Intrusive Identity Management

This paper presents a novel architecture for digital identity management. The proposed architecture is highly secure and scales seamlessly across organizational boundaries, while at the same time protecting the privacy interests of individuals and organizations. To achieve these properties, the architecture heavily relies on Digital Credentials, a cryptographic authentication technology specifi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied Sciences

سال: 2019

ISSN: 2076-3417

DOI: 10.3390/app9071407