16 resultados para Access Schemes
em Chinese Academy of Sciences Institutional Repositories Grid Portal
Resumo:
A finite compact (FC) difference scheme requiring only bi-diagonal matrix inversion is proposed by using the known high-resolution flux. Introducing TVD or ENO limiters in the numerical flux, several high-resolution FC-schemes of hyperbolic conservation law are developed, including the FC-TVD, third-order FC-ENO and fifth-order FC-ENO schemes. Boundary conditions formulated need only one unknown variable for third-order FC-ENO scheme and two unknown variables for fifth-order FC-ENO scheme. Numerical test results of the proposed FC-scheme were compared with traditional TVD, ENO and WENO schemes to demonstrate its high-order accuracy and high-resolution.
Resumo:
Hybrid finite compact (FC)-WENO schemes are proposed for shock calculations. The two sub-schemes (finite compact difference scheme and WENO scheme) are hybridized by means of the similar treatment as in ENO schemes. The hybrid schemes have the advantages of FC and WENO schemes. One is that they possess the merit of the finite compact difference scheme, which requires only bi-diagonal matrix inversion and can apply the known high-resolution flux to obtain high-performance numerical flux function; another is that they have the high-resolution property of WENO scheme for shock capturing. The numerical results show that FC-WENO schemes have better resolution properties than both FC-ENO schemes and WENO schemes. In addition, some comparisons of FC-ENO and artificial compression method (ACM) filter scheme of Yee et al. are also given.
Resumo:
High order accurate schemes are needed to simulate the multi-scale complex flow fields to get fine structures in simulation of the complex flows with large gradient of fluid parameters near the wall, and schemes on non-uniform mesh are desirable for many CFD (computational fluid dynamics) workers. The construction methods of difference approximations and several difference approximations on non-uniform mesh are presented. The accuracy of the methods and the influence of stretch ratio of the neighbor mesh increment on accuracy are discussed. Some comments on these methods are given, and comparison of the accuracy of the results obtained by schemes based on both non-uniform mesh and coordinate transformation is made, and some numerical examples with non-uniform mesh are presented.
Resumo:
The role of dispersions in the numerical solutions of hydrodynamic equation systems has been realized for long time. It is only during the last two decades that extensive studies on the dispersion-controlled dissipative (DCD) schemes were reported. The studies have demonstrated that this kind of the schemes is distinct from conventional dissipation-based schemes in which the dispersion term of the modified equation is not considered in scheme construction to avoid nonphysical oscillation occurring in shock wave simulations. The principle of the dispersion controlled aims at removing nonphysical oscillations by making use of dispersion characteristics instead of adding artificial viscosity to dissipate the oscillation as the conventional schemes do. Research progresses on the dispersion controlled principles are reviewed in this paper, including the exploration of the role of dispersions in numerical simulations, the development of the dispersion-controlled principles, efforts devoted to high-order dispersion-controlled dissipative schemes, the extension to both the finite volume and the finite element methods, scheme verification and solution validation, and comments on several aspects of the schemes from author's viewpoint.
Resumo:
Submitted by 阎军 (yanj@red.semi.ac.cn) on 2010-06-07T01:33:41Z No. of bitstreams: 1 ApplPhysLett_96_213505.pdf: 1153920 bytes, checksum: 69931d8deb797813dd478b5dd0e292c0 (MD5)
Resumo:
Password authentication has been adopted as one of the most commonly used solutions in network environment to protect resources from unauthorized access. Recently, Lee–Kim–Yoo [S.W. Lee, H.S. Kim, K.Y. Yoo, Improvement of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards & Interfaces 27 (2) (2005) 181–183] and Lee-Chiu [N.Y. Lee, Y.C. Chiu, Improved remote authentication scheme with smart card, Computer Standards & Interfaces 27 (2) (2005) 177–180] respectively proposed a smart card based password authentication scheme. We show that these two schemes are both subject to forgery attacks provided that the information stored in the smart card is disclosed by the adversary. We also propose an improved scheme with formal security proof.
Resumo:
IEEE Computer Society
Resumo:
National Natural Science Foundation of China; Dalian University of Technology
Resumo:
This paper presents the vulnerabilities of single event effects (SEEs) simulated by heavy ions on ground and observed oil SJ-5 research satellite in space for static random access memories (SRAMs). A single event upset (SEU) prediction code has been used to estimate the proton-induced upset rates based oil the ground test curve of SEU cross-section versus heavy ion linear energy transfer (LET). The result agrees with that of the flight data.
Resumo:
IEEE; IEEE Computer Society; IEEE Technical Committee on Scalable Computing (TCSC)