Search results for "39"
showing 10 items of 1787 documents
Discontinuous Galerkin semi-Lagrangian method for Vlasov-Poisson
2011
We present a discontinuous Galerkin scheme for the numerical approximation of the one-dimensional periodic Vlasov-Poisson equation. The scheme is based on a Galerkin-characteristics method in which the distribution function is projected onto a space of discontinuous functions. We present comparisons with a semi-Lagrangian method to emphasize the good behavior of this scheme when applied to Vlasov-Poisson test cases. Une méthode de Galerkin discontinu est proposée pour l’approximation numérique de l’équation de Vlasov-Poisson 1D. L’approche est basée sur une méthode Galerkin-caractéristiques où la fonction de distribution est projetée sur un espace de fonctions discontinues. En particulier, …
Parallel Computing for the study of the focusing Davey-Stewartson II equation in semiclassical limit
2012
The asymptotic description of the semiclassical limit of nonlinear Schrödinger equations is a major challenge with so far only scattered results in 1 + 1 dimensions. In this limit, solutions to the NLS equations can have zones of rapid modulated oscillations or blow up. We numerically study in this work the Davey-Stewartson system, a 2 + 1 dimensional nonlinear Schrödinger equation with a nonlocal term, by using parallel computing. This leads to the first results on the semiclassical limit for the Davey-Stewartson equations.
Determination of consensus kQ values for megavoltage photon beams for the update of IAEA TRS-398
2020
The IAEA is currently coordinating a multi-year project to update the TRS-398 Code of Practice for the dosimetry of external beam radiotherapy based on standards of absorbed dose to water. One major aspect of the project is the determination of new beam quality correction factors, kQ, for megavoltage photon beams consistent with developments in radiotherapy dosimetry and technology since the publication of TRS-398 in 2000. Specifically, all values must be based on, or consistent with, the key data of ICRU Report 90. Data sets obtained from Monte Carlo (MC) calculations by advanced users and measurements at primary standards laboratories have been compiled for 23 cylindrical ionization chamb…
Problematiche etiche relative al trattamento sanitario obbligatorio.
2010
La naranja que se exporta es el alimento del pueblo y las armas para la lucha contra el invasor extrangero
D'un taronger surten dues branques que agarren a un home -amb la creu gammada- pel coll i ho derroquen sobre unes mates. Entre l'home i l'arbre està l'escut d'Espanya
La ley castiga con la pena de muerte al saboteador de la economía nacional Cometen sabotage los que impiden que la mejor naranja se convierta en dine…
Figura de dona amb ales d'àngel i un llaurador oferint-li un penjoll de taronges. Entre l'home i la dona està l'escut d'Espanya
Las dificultades de los futuros maestros ante la LIJ: el ejemplo de Alfanhuí
2014
Ilustración: "Setting eyes in sleeping dolls". Lewis Hine, U.S. National Archives
3608 anuncios para el Teatro Principal y Teatro de la Princesa de Valencia, de 1839 a 1877 impresos en casa Ferrer de Orga.
Dades preses del v. 11
Underlying Simple Graphs
2019
Summary In this article the notion of the underlying simple graph of a graph (as defined in [8]) is formalized in the Mizar system [5], along with some convenient variants. The property of a graph to be without decorators (as introduced in [7]) is formalized as well to serve as the base of graph enumerations in the future.
On the Cryptanalysis of Two Cryptographic Algorithms That Utilize Chaotic Neural Networks
2015
This paper deals with the security and efficiency issues of two cipher algorithms which utilize the principles of Chaotic Neural Networks (CNNs). The two algorithms that we consider are (1) the CNN-Hash, which is a one-way hash function based on the Piece-Wise Linear Chaotic Map (PWLCM) and the One-Way Coupled Map Lattice (OCML), and (2) the Delayed CNN-Based Encryption (DCBE), which is an encryption algorithm based on the delayed CNN. Although both of these cipher algorithms have their own salient characteristics, our analysis shows that, unfortunately, the CNN-Hash is not secure because it is neither Second-Preimage resistant nor collision resistant. Indeed, one can find a collision with …