3,557 research outputs found

    Eno-Osher schemes for Euler equations

    Get PDF
    The combination of the Osher approximate Riemann solver for the Euler equations and various ENO schemes is discussed for one-dimensional flow. The three basic approaches, viz. the ENO scheme using primitive variable reconstruction, either with Cauchy-Kowalewski procedure for time integration or the TVD Runge-Kutta scheme, and the flux-ENO method are tested on different shock tube cases. The shock tube cases were chosen to present a serious challenge to the ENO schemes in order to test their ability to capture flow discontinuities, such as shocks. Also the effect of the ordering of the eigen values, viz. natural or reversed ordering, in the Osher scheme is investigated. The ENO schemes are tested up to fifth order accuracy in space and time. The ENO-Osher scheme using the Cauchy-Kowalewski procedure for time integration is found to be the most accurate and robust compared with the other methods and is also computationally efficient. The tests showed that the ENO schemes perform reasonably well, but have problems in cases where two discontinuities are close together. In that case there are not enough points in the smooth part of the flow to create a non-oscillatory interpolation

    Gradient flows without blow-up for Lefschetz thimbles

    Full text link
    We propose new gradient flows that define Lefschetz thimbles and do not blow up in a finite flow time. We study analytic properties of these gradient flows, and confirm them by numerical tests in simple examples.Comment: 31 pages, 11 figures, (v2) conclusion part is expande

    Penerapan Metode Support Vector Machine pada Sistem Deteksi Intrusi secara Real-time

    Full text link
    Intrusion detection system is a system for detecting attacks or intrusions in a network or computer system, generally intrusion detection is done with comparing network traffic pattern with known attack pattern or with finding unnormal pattern of network traffic. The raise of internet activity has increase the number of packet data that must be analyzed for build the attack or normal pattern, this situation led to the possibility that the system can not detect the intrusion with a new technique, so it needs a system that can automaticaly build a pattern or model.This research have a goal to build an intrusion detection system with ability to create a model automaticaly and can detect the intrusion in real-time environment with using support vector machine method as a one of data mining method for classifying network traffic audit data in 3 classes, namely: normal, probe, and DoS. Audit data was established from preprocessing of network packet capture files that obtained from Tshark. Based on the test result, the sistem can help system administrator to build a model or pattern automaticaly with high accuracy, high attack detection rate, and low false positive rate. The sistem also can run in real-time environment

    Orbital navigation, docking and obstacle avoidance as a form of three dimensional model-based image understanding

    Get PDF
    Range imagery from a laser scanner can be used to provide sufficient information for docking and obstacle avoidance procedures to be performed automatically. Three dimensional model-based computer vision algorithms in development can perform these tasks even with targets which may not be cooperative (that is, objects without special targets or markers to provide unambiguous points). Role, pitch, and yaw of a vehicle can be taken into account as image scanning takes place, so that these can be correlated when the image is converted from egocentric to world coordinated. Other attributes of the sensor, such as the registered reflectance and texture channels, provide additional data sources for algorithm robustness

    Random Matrix Models for Dirac Operators at finite Lattice Spacing

    Full text link
    We study discretization effects of the Wilson and staggered Dirac operator with Nc>2N_{\rm c}>2 using chiral random matrix theory (chRMT). We obtain analytical results for the joint probability density of Wilson-chRMT in terms of a determinantal expression over complex pairs of eigenvalues, and real eigenvalues corresponding to eigenvectors of positive or negative chirality as well as for the eigenvalue densities. The explicit dependence on the lattice spacing can be readily read off from our results which are compared to numerical simulations of Wilson-chRMT. For the staggered Dirac operator we have studied random matrices modeling the transition from non-degenerate eigenvalues at non-zero lattice spacing to degenerate ones in the continuum limit.Comment: 7 pages, 6 figures, Proceedings for the XXIX International Symposium on Lattice Field Theory, July 10 -- 16 2011, Squaw Valley, Lake Tahoe, California, PACS: 12.38.Gc, 05.50.+q, 02.10.Yn, 11.15.H

    The Factorization Method for Simulating Systems With a Complex Action

    Full text link
    We propose a method for Monte Carlo simulations of systems with a complex action. The method has the advantages of being in principle applicable to any such system and provides a solution to the overlap problem. We apply it in random matrix theory of finite density QCD where we compare with analytic results. In this model we find non--commutativity of the limits μ0\mu\to 0 and NN\to\infty which could be of relevance in QCD at finite density.Comment: Talk by K.N.A. at Confinement 2003, Tokyo, July 2003, 5 pages, 4 figures, ws-procs9x6.cl

    Liquid co-fluidization of cylinders and spheres

    Get PDF
    open access via UoA Wiley agreement The peer review history for this article is available at https://publons.com/publon/10.1002/cjce.24410.Peer reviewedPublisher PD

    Commitment in social life, sex and symbiosis

    Get PDF
    corecore