نتایج جستجو برای: dierential equation

تعداد نتایج: 229764  

1995
Guillermo Sapiro Vicent Caselles

The explicit use of partial di erential equations (PDE's) in image processing became a major topic of study in the last years. In this work we present an algorithm for histogram modi cation via PDE's. We show that the histogram can be modi ed to achieve any given distribution. The modi cation can be performed while simultaneously reducing noise. This avoids the noise sharpening e ect in classic...

2000
J. Timmer

We discuss the problem of parameter estimation in nonlinear stochastic di€erential equations (SDEs) based on sampled time series. A central message from the theory of integrating SDEs is that there exist in general two time scales, i.e. that of integrating these equations and that of sampling. We argue that therefore, maximum likelihood estimation is computationally extremely expensive. We disc...

Here, a new method called Aboodh transform homotopy perturbation method(ATHPM) is used to solve nonlinear partial dierential equations, we presenta reliable combination of homotopy perturbation method and Aboodh transformto investigate some nonlinear partial dierential equations. The nonlinearterms can be handled by the use of homotopy perturbation method. The resultsshow the eciency of this me...

Journal: :British Journal of Mathematics & Computer Science 2014

Journal: :Discrete Applied Mathematics 2005
Hidekata Hontani Mi-Ho Giga Yoshikazu Giga Koichiro Deguchi

A n umerical method for obtaining a crystalline ow starting from a general polygon is presented. A crystalline ow is a polygonal ow and can be regarded as a discrete version of a classical curvature ow. In some cases, new facets may be created instantaneously and their facet lengths are governed by a system of singular ordinary dierential equations (ODEs). The proposed method solves the system ...

2008

Pairings permit several protocol simplications and original scheme creation, for example Identity Based Cryptography protocols. Initially, the use of pairings did not involve any secret entry, consequently, side channel attacks were not a threat for pairing based cryptography. On the contrary, in an Identity Based Cryptographic protocol, one of the two entries to the pairing is secret. Side Cha...

2007
Kenji FUKAYA

x0 h and S Cobordism Theorems-review-In this article the author would like to propose a natural generalization of celebrated h and S coboridism theorems to loop space. We will explain some part of the idea of the proof of an (easier) half of it, and also a nite dimensional analogue of the conjecture which can be proved under some additional assumptions. The detailed proof of them will appear el...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بناب - دانشکده علوم پایه 1393

در این پایان نامه یک روش عددی برای حل معادلات کسری-زمانی و کسری-فضایی برگر ‎egin{equation*}‎ ‎d_t^{alpha}u+varepsilon uu_{x}= u u_{xx}+eta d_x^{eta}u‎, ‎end{equation*}‎ معادله ی کسری-زمانی و کسری-فضایی پوآسن ‎egin{equation*}‎ ‎d_x^{eta}u‎ + ‎d_t^{alpha}u = f(x,t)‎, ‎end{equation*}‎ و معادله ی کسری-زمانی انتشار ‎egin{equation*}‎ ‎d_t^alpha u+u=k abla^2 u‎ + ‎f(x,t)‎, ‎end{equation*}‎ ...

Journal: :International Journal of Basic and Applied Sciences 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید