نتایج جستجو برای: symmetric method

تعداد نتایج: 1698272  

Journal: :CoRR 2002
W. Chen

The boundary knot method (BKM) is a recent boundary-type radial basis function (RBF) collocation scheme for general PDE’s. Like the method of fundamental solution (MFS), the RBF is employed to approximate the inhomogeneous terms via the dual reciprocity principle. Unlike the MFS, the method uses a non-singular general solution instead of a singular fundamental solution to evaluate the homogeneo...

In this paper, we present a new two-step trigonometrically fitted symmetric Obrechkoff method. The method is based on the symmetric two-step Obrechkoff method, with eighth algebraic order, high phase-lag order and is constructed to solve IVPs with periodic solutions such as orbital problems. We compare the new method to some recently constructed optimized methods from the literature. The numeri...

Journal: :iranian journal of fuzzy systems 2012
majid alavi babak asady

in this paper a linear fuzzy fredholm integral equation(ffie) with arbitrary fuzzy function input and symmetric triangular (fuzzy interval) output is considered. for each variable, output is the nearest triangular fuzzy number (fuzzy interval) to the exact fuzzy solution of (ffie).

Journal: :bulletin of the iranian mathematical society 0
n. mahdavi-amiri faculty of‎ ‎mathematical sciences‎, ‎sharif‎ ‎university of technology‎, ‎tehran‎, ‎iran. b. kheirfam azarbaijan shahid madani university, ‎tabriz‎, ‎iran.

we present an improved version of a full nesterov-todd step infeasible interior-point method for linear complementarityproblem over symmetric cone (bull. iranian math. soc.,40(3), 541-564, (2014)). in the earlier version, each iteration consistedof one so-called feasibility step and a few -at most three -centering steps. here, each iteration consists of only a feasibilitystep. thus, the new alg...

Journal: :bulletin of the iranian mathematical society 2011
a. j. frankild s. sather-wagstaff a. taylor

we investigate buchbaum and eisenbud's construction of the second symmetric power $s_r(x)$ of a chain complex $x$ of modules over a commutative ring $r$. we state and prove a number of results from the folklore of the subject for which we know of no good direct references. we also provide several explicit computations and examples. we use this construction to prove the following ...

Journal: :Computational Optimization and Applications 2013

A. Davar, H. M. Panahiha

In this paper, the nonlinear free vibrations of thin symmetric and non-symmetric cross-ply composite plates subjected to biaxial initial stresses are investigated. Because of their excellent properties such as specific strength and specific stiffness, composite plates have wide applications in aerospace and mechanical structures. Based on Von-Karman's strain-displacement relations and using Gal...

Journal: :Comput. Meth. in Appl. Math. 2013
Panagiotis Chatzipantelidis Raytcho D. Lazarov Vidar Thomée

We study spatially semidiscrete and fully discrete finite volume element methods for the homogeneous heat equation with homogeneous Dirichlet boundary conditions and derive error estimates for smooth and nonsmooth initial data. We show that the results of our earlier work [Math. Comp. 81 (2012), 1–20] for the lumped mass method carry over to the present situation. In particular, in order for er...

Journal: :Journal of Approximation Theory 2014
Kerstin Jordaan Ferenc Toókos

The family of general Jacobi polynomials P (α,β) n where α, β ∈ C can be characterised by complex (nonhermitian) orthogonality relations (cf. [15]). The special subclass of Jacobi polynomials P (α,β) n where α, β ∈ R are classical and the real orthogonality, quasi-orthogonality as well as related properties, such as the behaviour of the n real zeros, have been well studied. There is another spe...

B. Kheirfam, M. Haghighi

In this paper, by using the exponential convexity property of a barrier function, we propose an infeasible interior-point method for Cartesian P_*(k) horizontal linear complementarity problem over symmetric cones. The method uses Nesterov and Todd full steps, and we prove that the proposed algorithm is well define. The iteration bound coincides with the currently best iteration bound for the Ca...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید