The Evolutionary Code Cesam: Numerical Techniques
نویسندگان
چکیده
منابع مشابه
CESAM: a free code for stellar evolution calculations
The cesam code is a consistent set of programs and routines which perform calculations of 1D quasi-hydrostatic stellar evolution including microscopic diffusion of chemical species and diffusion of angular momentum. The solution of the quasi-static equilibrium is performed by a collocation method based on piecewise polynomials approximations projected on a B-spline basis; that allows stable and...
متن کاملthe algorithm for solving the inverse numerical range problem
برد عددی ماتریس مربعی a را با w(a) نشان داده و به این صورت تعریف می کنیم w(a)={x8ax:x ?s1} ، که در آن s1 گوی واحد است. در سال 2009، راسل کاردن مساله برد عددی معکوس را به این صورت مطرح کرده است : برای نقطه z?w(a)، بردار x?s1 را به گونه ای می یابیم که z=x*ax، در این پایان نامه ، الگوریتمی برای حل مساله برد عددی معکوس ارانه می دهیم.
15 صفحه اولTowards Improving Numerical Weather Predictions by Evolutionary Computing Techniques
Weather forecasting is complex and not always accurate, moreover, it is generally defined by its very nature as a process that has to deal with uncertainties. In a previous work, a new weather prediction scheme was presented, which uses evolutionary computing methods, particularly, Genetic Algorithms in order to find the most timely ‘optimal’ values of model closure parameters that appear in ph...
متن کاملCode optimization techniques for micro-code compilers
With the ever expanding volume of system functions directly implemented in microcode and the growth of microprocessor applications, it has become necessary to design high level language compilers for these machines to achieve high programming productivity. However, because of the very low level architecture of many of these machines, compilers that generate efficient code for these machines hav...
متن کاملMobile Code Security Techniques
This paper presents a survey of existing techniques for achieving mobile code security, as well as a representative sampling of systems which use them. In particular, the problem domain is divided into two portions: protecting hosts from malicious code; and protecting mobile code from malicious hosts. The discussion of the malicious code problem includes a more in-depth study of the Java securi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Astronomical Union Colloquium
سال: 1993
ISSN: 0252-9211
DOI: 10.1017/s0252921100018200