Mostrando 221 - 240 Resultados de 319 Para Buscar '"Euler"', tiempo de consulta: 0.08s Limitar resultados
  1. 221
    Publicado 2006
    Tabla de Contenidos: “…Conjugate gradient method -- Extension to general (non-quadratic) functions -- Powell's conjugate direction method -- Quasi-Newton Methods -- Closure -- Exercises -- Chapter 24: Constrained Optimization -- Constraints -- Optimality Criteria -- Sensitivity -- Duality* -- Structure of Methods: An Overview* -- Penalty methods -- Primal methods -- Dual methods -- Lagrange methods -- Exercises -- Chapter 25: Linear and Quadratic Programming Problems* -- Linear Programming -- The simplex method -- General perspective -- Quadratic Programming -- Active set method -- Linear complementary problem -- A trust region method -- Duality -- Exercises -- Chapter 26: Interpolation and Approximation -- Polynomial Interpolation -- Lagrange interpolation -- Newton interpolation -- Limitations of single-polynomial interpolation -- Hermite interpolation -- Piecewise Polynomial Interpolation -- Piecewise cubic interpolation -- Spline interpolation -- Interpolation of Multivariate Functions -- Piecewise bilinear interpolation -- Piecewise bicubic interpolation -- A Note on Approximation of Functions -- Modelling of Curves and Surfaces* -- Exercises -- Chapter 27: Basic Methods of Numerical Integration -- Newton-Cotes Integration Formulae -- Mid-point rule -- Trapezoidal rule -- Simpson's rules -- Richardson Extrapolation and Romberg Integration -- Further Issues -- Exercises -- Chapter 28: Advanced Topics in Numerical Integration* -- Gaussian Quadrature -- Gauss-Legendre quadrature -- Weight functions in Gaussian quadrature -- Multiple Integrals -- Double integral on rectangular domain -- Monte Carlo integration -- Exercises -- Chapter 29: Numerical Solution of Ordinary Differential Equations -- Single-Step Methods -- Euler's method -- Improved Euler's method or Heun's method -- Runge-Kutta methods -- Practical Implementation of Single-Step Methods…”
    Libro electrónico
  2. 222
    Publicado 2023
    Tabla de Contenidos: “…About the Editor vii -- Preface to "Symmetric Distributions, Moments and Applications" ix -- Zivorad Tomovski -- Special Issue Editorial "Symmetric Distributions, Moments and Applications" -- Reprinted from: Symmetry 2022, 14, 1863, doi:10.3390/sym14091863 1 -- Robert Frontczak and Zivorad Tomovski -- ˇ -- Convolutions for Bernoulli and Euler-Genocchi Polynomials of Order (r,m) and Their -- Probabilistic Interpretation † -- Reprinted from: Symmetry 2022, 14, 1220, doi:10.3390/sym14061220 5 -- Mohamed S. …”
    Libro electrónico
  3. 223
  4. 224
    Publicado 2020
    “…¿Cómo eran los dioses de Aristóteles, Averroes, Copérnico, Kepler, Galileo, Descartes, Leibniz, Pascal, Newton, Euler, Laplace, Faraday, Maxwell, Boltzmann, Einstein, Planck, Heisenberg, Schrödinger, Dirac, y tantos otros venerados hoy como genios de la física? …”
    Libro
  5. 225
    por Domínguez, Consuelo
    Publicado 2012
    Tabla de Contenidos: “…LOS LOGARITMOS Y LA CUADRATURA DE (...); 2.3.3. LEONHARD EULER: LA FUNCIÓN LOGARÍTMICA…”
    Libro electrónico
  6. 226
    Publicado 2014
    Tabla de Contenidos: “…Calculus of Variations; Euler-Lagrange equation; 1.7.1. Euler-Lagrange equation; 1.7.2. …”
    Libro electrónico
  7. 227
    por Thorby, Douglas
    Publicado 2008
    Tabla de Contenidos: “…Chapter 3 The Linear Single Degree of Freedom System: Response in the Time Domain3.1 Exact analytical methods; 3.1.1 The Laplace transform method; 3.1.2 The convolution or Duhamel integral; 3.1.3 Listings of standard responses; 3.2 'Semi-analytical' methods; 3.2.1 Impulse response method; 3.2.2 Straight-line approximation to input function; 3.2.3 Superposition of standard responses; 3.3 Step-by-step numerical methods using approximate derivatives; 3.3.1 Euler method; 3.3.2 Modified Euler method; 3.3.3 Central difference method; 3.3.4 The Runge-Kutta method…”
    Libro electrónico
  8. 228
    Publicado 2002
    Tabla de Contenidos: “…-- The Rise of Cognitive Modelling -- Modelling and Simulation -- The Role of Cognitive Modelling -- Further Benefits of Cognitive Modelling -- Some Objections to Cognitive Modelling -- Approaches to Cognitive Modelling -- Strategies for the Use of Simulation -- Closing Remarks -- Further Reading -- 2 An Introduction to COGENT -- COGENT: Principal Features -- An Illustrative Task: Free Recall -- Getting Started -- Specifying Basic Experimenter Functions -- The Modal Model in COGENT -- Representation and Variable Binding -- Augmenting the Experiment Environment -- Extending the Modal Model -- Further Reading -- II Modelling in Specific Domains -- Overview -- 3 Arithmetic: A Cognitive Skill -- Cognitive Skills -- Multicolumn Addition -- Multicolumn Subtraction -- General Discussion -- Further Reading -- Appendix: Rules for Execute Action -- 4 Problem Solving -- The Psychology of Problem Solving -- The Missionaries and Cannibals Problem -- The Tower of Hanoi -- Toward a General Problem Solver -- Further Reading -- 5 Deductive Reasoning -- Introduction -- Basic Effects in Human Deductive Reasoning -- Syllogistic Reasoning with Mental Models -- Building a Mental Model -- Revising a Mental Model -- Project: Reasoning as Problem Solving -- Syllogistic Reasoning with Euler Circles -- General Discussion -- Further Reading -- 6 Decision Making -- The Psychology of Decision Making -- Medical Diagnosis -- Incorporating Cue Selection -- Medical Diagnosis by Hypothesis Testing -- Taking Stock -- Further Reading -- 7 Sentence Processing -- Background -- A First Model -- Towards Incremental Interpretation -- Serial Parsing -- Alternative Approaches to Sentence Processing -- Further Reading -- 8 Executive Processes -- The Domain of Executive Processes -- Basic Psychological Findings -- A Framework -- Modelling the Supervisory Attentional System -- Monitoring and the Six Element Test -- Alternative Views of Executive Processes -- Summary -- Further Reading -- III Reflections -- 9 Reflections -- An Assessment of Progress -- Emergent Issues -- Methodologies for Modelling -- Issues for COGENT -- An Agenda -- Closing Remarks…”
    Libro electrónico
  9. 229
    Publicado 2018
    Tabla de Contenidos: “…Intro -- 1 Introduction -- Geometric curvature energies: facts, trends, and open problems -- 2.1 Facts -- 2.2 Trends and open problems -- Bibliography -- On Möbius invariant decomposition of the Möbius energy -- 3.1 O'Hara's knot energies -- 3.2 Freedman-He-Wang's procedure and the Kusner-Sullivan conjecture -- 3.3 Basic properties of the Möbius energy -- 3.4 The Möbius invariant decomposition -- 3.4.1 The decomposition -- 3.4.2 Variational formulae -- 3.4.3 The Möbius invariance -- Bibliography -- Pseudogradient Flows of Geometric Energies -- 4.1 Introduction -- 4.2 Banach Bundles -- 4.2.1 General Fiber Bundles -- 4.2.2 Banach Bundles and Hilbert Bundles -- 4.3 Riesz Structures -- 4.3.1 Riesz Structures -- 4.3.2 Riesz Bundle Structures -- 4.3.3 Riesz Manifolds -- 4.4 Pseudogradient Flow -- 4.5 Applications -- 4.5.1 Minimal Surfaces -- 4.5.2 Elasticae -- 4.5.3 Euler-Bernoulli Energy and Euler Elastica -- 4.5.4 Willmore Energy -- 4.6 Final Remarks -- Bibliography -- Discrete knot energies -- 5.1 Introduction -- 5.1.1 Notation -- 5.2 Möbius Energy -- 5.3 Integral Menger Curvature -- 5.4 Thickness -- A.1 Appendix: Postlude in -convergence -- Bibliography -- Khovanov homology and torsion -- 6.1 Introduction -- 6.2 Definition and structure of Khovanov link homology -- 6.3 Torsion of Khovanov link homology -- 6.4 Homological invariants of alternating and quasi-alternating cobordisms -- Bibliography -- Quadrisecants and essential secants of knots -- 7.1 Introduction -- 7.2 Quadrisecants -- 7.2.1 Essential secants -- 7.2.2 Results about quadrisecants -- 7.2.3 Counting quadrisecants and quadrisecant approximations. -- 7.3 Key ideas in showing quadrisecants exist -- 7.3.1 Trisecants and quadrisecants. -- 7.3.2 Structure of the set of trisecants. -- 7.4 Applications of essential secants and quadrisecants -- 7.4.1 Total curvature -- 7.4.2 Second Hull…”
    Libro electrónico
  10. 230
    Publicado 2018
    Tabla de Contenidos: “…TEORÍA DE CONJUNTOS -- 1.1 DEFINICIONES INICIALES -- 1.2 RELACIONES ENTRE CONJUNTOS -- 1.3 OPERACIONES ENTRE CONJUNTOS -- 1.4 DIAGRAMAS DE VENN EULER -- 1.5 APLICACIONES DE LOS CONJUNTOS EN LA SOLUCIÓN DE (...) -- 1.6 EJERCICIOS DE PRÁCTICA I -- 1.7 MATEMÁTICAS EN LA WEB -- 2. …”
    Enlace del recurso
    Libro electrónico
  11. 231
    por Acovitsioti-Hameau, Ada
    Publicado 2022
    Electrónico
  12. 232
    por Tzafestas, S. G., 1939-
    Publicado 2014
    Tabla de Contenidos: “…3 Mobile Robot Dynamics 3.1 Introduction; 3.2 General Robot Dynamic Modeling; 3.2.1 Newton-Euler Dynamic Model; 3.2.2 Lagrange Dynamic Model; 3.2.3 Lagrange Model of a Multilink Robot; 3.2.4 Dynamic Modeling of Nonholonomic Robots; 3.3 Differential-Drive WMR; 3.3.1 Newton-Euler Dynamic Model; 3.3.2 Lagrange Dynamic Model; 3.3.3 Dynamics of WMR with Slip; 3.4 Car-Like WMR Dynamic Model; 3.5 Three-Wheel Omnidirectional Mobile Robot; 3.6 Four Mecanum-Wheel Omnidirectional Robot; References; 4 Mobile Robot Sensors; 4.1 Introduction; 4.2 Sensor Classification and Characteristics…”
    Libro electrónico
  13. 233
    Publicado 2010
    Tabla de Contenidos: “…EL CONTEXTO GENERAL DE LA CLASIFICACIÓN DE FUNCIONES -- 1.1. EULER Y LA PRIMERA CLASIFICACIÓN DE FUNCIONES -- 1.2. …”
    Libro electrónico
  14. 234
    Publicado 2021
    “…In the first contribution, Morbiducci and co-workers discuss the theoretical and methodological bases supporting the Lagrangian- and Euler-based methods, highlighting their application to cardiovascular flows. …”
    Libro electrónico
  15. 235
    Publicado 2009
    Tabla de Contenidos: “…General introduction to cultural transmission : developmental, psychological, social and methodological aspects / Ute Schönpflug -- Cultural transmission : a short history of research and theory / Ute Schönpflug -- Evolutionary perspective -- Cultural transmission : a view from chimpanzees and human infants / Michael Tomasello -- Transmission, self-organization, and the emergence of language : a dynamic systems point of view / Paul van Geert -- Relationship-specific intergenerational family ties : an evolutionary approach to the structure of cultural transmission / Harald A. Euler, Sabine Hoier, and Percy A. Rohde -- Cross-cultural perspective -- An ecocultural perspective on cultural transmission : the family across cultures / John W. …”
    Libro electrónico
  16. 236
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
    Libro electrónico
  17. 237
    por García, Isaac
    Publicado 2005
    Tabla de Contenidos: “…Introducción; 8.3. Ecuaciones de Euler-Lagrange; 8.4. Extremos con restricciones; 8.5. …”
    Libro electrónico
  18. 238
    Publicado 2019
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Acknowledgments -- Preface -- Chapter 1 Basic Numerical Methods -- 1.1 Introduction -- 1.2 Ordinary Differential Equation -- 1.3 Euler Method -- 1.4 Improved Euler Method -- 1.5 Runge-Kutta Methods -- 1.5.1 Midpoint Method -- 1.5.2 Runge-Kutta Fourth Order -- 1.6 Multistep Methods -- 1.6.1 Adams-Bashforth Method -- 1.6.2 Adams-Moulton Method -- 1.7 Higher‐Order ODE -- References -- Chapter 2 Integral Transforms -- 2.1 Introduction -- 2.2 Laplace Transform -- 2.2.1 Solution of Differential Equations Using Laplace Transforms -- 2.3 Fourier Transform -- 2.3.1 Solution of Partial Differential Equations Using Fourier Transforms -- References -- Chapter 3 Weighted Residual Methods -- 3.1 Introduction -- 3.2 Collocation Method -- 3.3 Subdomain Method -- 3.4 Least‐square Method -- 3.5 Galerkin Method -- 3.6 Comparison of WRMs -- References -- Chapter 4 Boundary Characteristics Orthogonal Polynomials -- 4.1 Introduction -- 4.2 Gram-Schmidt Orthogonalization Process -- 4.3 Generation of BCOPs -- 4.4 Galerkin's Method with BCOPs -- 4.5 Rayleigh-Ritz Method with BCOPs -- References -- Chapter 5 Finite Difference Method -- 5.1 Introduction -- 5.2 Finite Difference Schemes -- 5.2.1 Finite Difference Schemes for Ordinary Differential Equations -- 5.2.1.1 Forward Difference Scheme -- 5.2.1.2 Backward Difference Scheme -- 5.2.1.3 Central Difference Scheme -- 5.2.2 Finite Difference Schemes for Partial Differential Equations -- 5.3 Explicit and Implicit Finite Difference Schemes -- 5.3.1 Explicit Finite Difference Method -- 5.3.2 Implicit Finite Difference Method -- References -- Chapter 6 Finite Element Method -- 6.1 Introduction -- 6.2 Finite Element Procedure -- 6.3 Galerkin Finite Element Method -- 6.3.1 Ordinary Differential Equation -- 6.3.2 Partial Differential Equation -- 6.4 Structural Analysis Using FEM…”
    Libro electrónico
  19. 239
    por Rivera Figueroa, Antonio
    Publicado 2014
    Tabla de Contenidos: “….; 4.7.1.1 Postulado de continuidad (teorema de Weierstrass); 4.7.1.2 Teorema (criterio de Cauchy); 4.8 Algunas sucesiones especiales; 4.8.1 La sucesión a; 4.8.2 La sucesión an; 4.8.3 La sucesión n; 4.8.4 Número e de Euler…”
    Libro electrónico
  20. 240
    Publicado 2014
    Tabla de Contenidos: “…Cover -- Copyright -- Contents -- About the author -- Preface -- Chapter 1: Modelling theory -- 1.1 Context and Nature of Modelling -- 1.1.1 Classification of models -- 1.1.2 Computational Hydraulics -- 1.2 Conceptualiation: Building a Model -- 1.3 Mathematical Modelling in Practice -- 1.3.1 Selecting a proper model -- 1.3.2 Testing a model -- 1.4 Development and Application of Models -- Chapter 2: Modelling water related problems -- 2.1 Basic Conservation Equations -- 2.1.1 Conservation of mass -- 2.1.2 Conservation of momentum -- 2.1.3 Conservation of energy -- 2.2 Mathematical Classification of Flow Equations -- 2.2.1 Solutions of ODE -- 2.2.2 Solutions of PDE -- 2.3 Navier-Stokes and Saint-Venant Equations -- 2.3.1 Navier-Stokes equations -- 2.3.2 Saint-Venant equations -- 2.3.3 Characteristic form of Saint-Venant equations -- Chapter 3: Discretization of the fluid flow domain -- 3.1 Discrete Solutions of Equations -- 3.2 Space Discretization -- 3.2.1 Structured grids -- 3.2.2 Unstructured grids -- 3.2.3 Grid generation -- 3.2.4 Physical aspects of space discretization -- 3.3 Time Discretization -- Chapter 4: Finite difference method -- 4.1 General Concepts -- 4.2 Approximation of the First Order Derrivative -- 4.3 Approximation of Higher Order Derrivatives -- 4.4 Finite Differences for Ordinary Differential Equations -- 4.4.1 Problem position -- 4.4.2 Explicit schemes (Euler method) -- 4.4.3 Implicit schemes (Improved Euler method) -- 4.4.4 Mixed schemes -- 4.4.5 Weighted averaged schemes -- 4.4.6 Runge-Kutta methods -- 4.5 Numerical Schemes for Partial Differential Equations -- 4.5.1 Principle of FDM for PDEs -- 4.5.2 Hyperbolic PDEs -- 4.5.3 Parabolic PDEs -- 4.5.4 Elliptic PDEs -- 4.6 Examples -- 4.6.1 ODE: Solution of the linear reservoir problem -- 4.6.2 PDE: Simple wave propagation -- 4.6.3 PDE: Diffusion equation…”
    Libro electrónico