The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
Displaying 21 –
40 of
112
In this paper, we discuss the numerical methods for a class of convex boundary control problems. The boundary element method is applied for the approximations of the problems. The a posteriori error estimators for the boundary element approximations are presented, which can be applied as the indicators of the adaptive mesh refinement of the related boundary element methods.
This article formalizes some aspects of the board game Carcassonne. Combinatorical problems related to the number of tile types are mentioned. Then the paper describes a game map using graph theory.
This contribution shows how to compute upper bounds of the optimal constant in Friedrichs’ and similar inequalities. The approach is based on the method of [9]. However, this method requires trial and test functions with continuous second derivatives. We show how to avoid this requirement and how to compute the bounds on Friedrichs’ constant using standard finite element methods. This approach is quite general and allows variable coefficients and mixed boundary conditions. We use the computed...
The Euler methods are the most popular, simplest and widely used methods for the solution of the Cauchy problem for the first order ODE. The simplest and usual generalization of these methods are the so called theta-methods (notated also as -methods), which are, in fact, the convex linear combination of the two basic variants of the Euler methods, namely of the explicit Euler method (EEM) and of the implicit Euler method (IEM). This family of the methods is well-known and it is introduced almost...
In this contribution, higher-order finite element method is used for the solution of reaction-diffusion equation with Turing instability. Some aspects concerning convergence of the method for this particular problem are discussed. Our numerical tests confirm the convergence of the method, but for some very special choices of parameters, this convergence has very uncommon properties.
This paper is about -triangles, which are the simplest nontrivial examples of -polytopes: convex hulls of a subset of vertices of the unit -cube . We consider the subclasses of right -triangles, and acute -triangles, which only have acute angles. They can be explicitly counted and enumerated, also modulo the symmetries of .
This paper describes a model of influence of random errors on the safety of the communication. The role of the communication in railway safety is specified. To ensure a safe communication, using of safety code is important. The most important parameter of the safety code is the maximal value of the probability of undetected error. Problems related with computing of this value are outlined in the article. As a model for the information transmission the binary symmetrical channel is introduced. ...
We will study discontinuous dynamical systems of Filippov-type. Mathematically, Filippov-type systems are defined as a set of first-order differential equations with discontinuous right-hand side. These systems arise in various applications, e.g. in control theory (so called relay feedback systems), in chemical engineering (an ideal gas--liquid system), or in biology (predator-prey models). We will show the way how to extend these models by a set of algebraic equations and then study the resulting...
We present the full derivation of a one-dimensional free surface pipe or open channel flow model including friction with non constant geometry. The free surface model is obtained from the three-dimensional incompressible Navier-Stokes equations under shallow water assumptions with prescribed "well-suited" boundary conditions.
In the contribution growths of the neoplasms (benign and malignant tumors and cysts), located in a system of loaded bones, will be simulated. The main goal of the contribution is to present the useful methods and efficient algorithms for their solutions. Because the geometry of the system of loaded and possible fractured bones with enlarged neoplasms changes in time, the corresponding mathematical models of tumor's and cyst's evolutions lead to the coupled free boundary problems and the dynamic...
A simple device, based on the factorization of invertible matrix polynomials, enabling to identify the possibility of fast implementation of linear transforms is presented. Its applicability is demonstrated in the case of Hadamard matrices and their generalization, Hadamard matrix polynomials.
Currently displaying 21 –
40 of
112