نتایج جستجو برای: hybrid schemes

تعداد نتایج: 289827  

Jean‑Claude Malela‑Majika Marien Alet Graham

In this paper, Burr-type XII ̄X synthetic schemes are proposed as an alternative to the classical ̄X synthetic schemes when the assumption of normality fails to hold. First, the basic design of the Burr-type XII ̄X synthetic scheme is developed and its performance investigated using exact formulae. Secondly, the non-side-sensitive and side-sensitive Burr-type XII ̄X synthetic schemes are int...

Journal: :J. Comput. Physics 2013
Khosro Shahbazi Jan S. Hesthaven Xueyu Zhu

We introduce a multi-dimensional point-wise multi-domain hybrid Fourier-Continuation/WENO technique (FC-WENO) that enables high-order and non-oscillatory solution of systems of nonlinear conservation laws, and essentially dispersionless, spectral, solution away from discontinuities, as well as mild CFL constraints for explicit time stepping schemes. The hybrid scheme conjugates the expensive, s...

Journal: :J. Comput. Physics 2010
Gang Li Jianxian Qiu

A key idea in finite difference weighted essentially non-oscillatory (WENO) schemes is a combination of lower order fluxes to obtain a higher order approximation. The choice of the weight to each candidate stencil, which is a nonlinear function of the grid values, is crucial to the success of WENO. For the system case, WENO schemes are based on local characteristic decompositions and flux split...

Journal: :IET Communications 2012
Ghadamali Bagherikaram Konstantinos N. Plataniotis

In this study, the problem of transmitting an independent and identically distributed (i.i.d.) Gaussian source over an i.i.d. Gaussian wire-tap channel, with an i.i.d. Gaussian known interference available at the transmitter is considered. The intended receiver is assumed to have a certain minimum signal-to-noise ratio (SNR) and the eavesdropper is assumed to have a strictly lower SNR compared ...

2005
Józef Korbicz Marcin Witczak

The main objective of this tutorial is to present the 2005 situation of the state-of-the-art concerning the application of soft computing methods to fault diagnosis and supervision systems. Another objective is to show the unsolved and open problems of modern fault diagnosis and supervision that can be solved either with soft computing methods or hybrid systems based on analytical and soft comp...

2011
Chengwei Zheng Yun Wu John McAllister

Adaptive Multiple-Input Multiple-Output (MIMO) systems achieve a much higher information rate than conventional fixed schemes due to their ability to adapt their configurations according to the wireless communications environment. However, current adaptive MIMO detection schemes exhibit either low performance (and hence low spectral efficiency) or huge computational complexity. In particular, w...

Journal: :IEEE Trans. Communications 2000
Esa Malkamäki Harry Leib

This paper considers truncated type-II hybrid automatic repeat-request (ARQ) schemes with noisy feedback over block fading channels. With these ARQ techniques, the number of retransmissions is limited, and, similar to forward error correction (FEC), error-free delivery of data packets cannot be guaranteed. Bounds on the average number of transmissions, the average coding rate as well as the rel...

Journal: :Des. Codes Cryptography 2007
Masayuki Abe Yang Cui Hideki Imai Eike Kiltz

This paper deals with generic transformations from ID-based key encapsulation mechanisms (IBKEM) to hybrid public-key encryption (PKE). The best generic transformation known until now is by Boneh and Katz and requires roughly 704-bit overhead in the ciphertext. We present two new such generic transformations that are applicable to partitioned IBKEMs. A partitioned IBKEM is an IBKEM that provide...

Journal: :Computer Communications 2008
Rabia Riaz Ayesha Naureen Attiya Akram Ali Hammad Akbar Ki-Hyung Kim H. Farooq Ahmed

Pervasive computing environments find their practical manifestations through wireless sensor networks, which sense a relationship amongst themselves and the environment. Currently the proposed keying schemes for ensuring security, in wireless sensor networks, may be classified into public and private keying schemes, or their hybrid. However, an investigation in peer work underpins the fact that...

2006
Marc Spiegelman Richard F. Katz

[1] We present a hybrid method for the numerical solution of advection-diffusion problems that combines two standard algorithms: semi-Lagrangian schemes for hyperbolic advection-reaction problems and CrankNicolson schemes for purely diffusive problems. We show that the hybrid scheme is identical to the two end-member schemes in the limit of infinite and zero Peclet number and remains accurate o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید