Comparison of the Point-Collocation Non-Intrusive Polynomial (NIPC) and Non-Intrusive Spectral Projection (NISP) Methods for the γ-Rθ Transition Model
نویسندگان
چکیده
منابع مشابه
Comparison of Non-Intrusive Polynomial Chaos and Stochastic Collocation Methods for Uncertainty Quantification
Non-intrusive polynomial chaos expansion (PCE) and stochastic collocation (SC) methods are attractive techniques for uncertainty quantification (UQ) due to their strong mathematical basis and ability to produce functional representations of stochastic variability. PCE estimates coefficients for known orthogonal polynomial basis functions based on a set of response function evaluations, using sa...
متن کاملMultiscale Stochastic Preconditioners in Non-intrusive Spectral Projection
A preconditioning approach is developed that enables efficient polynomial chaos (PC) representations of uncertain dynamical systems. The approach is based on the definition of an appropriate multiscale stretching of the individual components of the dynamical system which, in particular, enables robust recovery of the unscaled transient dynamics. Efficient PC representations of the stochastic dy...
متن کاملIntrusive and non-intrusive watermarking
“Can we watermark without perturbing an image?” We present the salient results of the investigation carried out to find an answer to this question.
متن کاملUncertainty Analysis for Parametric Roll Using Non-intrusive Polynomial Chaos
In this paper, uncertainty analysis is carried out on both a simple parametric roll model which can be modeled as a Mathieu equation and a 1.5 degree-of-freedom parametric roll model in regular seas. For both cases, the uncertainty is brought into the system due to the error in predicting the damping coefficients. The non-intrusive polynomial chaos method has been used to assess how the paramet...
متن کاملNon-Intrusive Identity Management
This paper presents a novel architecture for digital identity management. The proposed architecture is highly secure and scales seamlessly across organizational boundaries, while at the same time protecting the privacy interests of individuals and organizations. To achieve these properties, the architecture heavily relies on Digital Credentials, a cryptographic authentication technology specifi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied Sciences
سال: 2019
ISSN: 2076-3417
DOI: 10.3390/app9071407