Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Matemáticas 21
- Mathematics 17
- Euler, Leonhard 14
- Research & information: general 12
- Mathematics & science 10
- Cálculo 7
- Data processing 7
- Física 7
- Historia 7
- MATLAB 7
- Ejercicios 6
- Filosofía 6
- Automatic control 5
- Caputo fractional derivative 5
- Differential equations 5
- Numerical analysis 5
- Biblia 4
- Digital techniques 4
- Engineering mathematics 4
- Geometría 4
- Image processing 4
- Matemáticos 4
- Mathematical models 4
- Mittag–Leffler function 4
- Nicolás de Cusa 4
- Physics 4
- Technology: general issues 4
- differential equations 4
- existence 4
- fixed point 4
-
221Publicado 2006Tabla de Contenidos: “…Conjugate gradient method -- Extension to general (non-quadratic) functions -- Powell's conjugate direction method -- Quasi-Newton Methods -- Closure -- Exercises -- Chapter 24: Constrained Optimization -- Constraints -- Optimality Criteria -- Sensitivity -- Duality* -- Structure of Methods: An Overview* -- Penalty methods -- Primal methods -- Dual methods -- Lagrange methods -- Exercises -- Chapter 25: Linear and Quadratic Programming Problems* -- Linear Programming -- The simplex method -- General perspective -- Quadratic Programming -- Active set method -- Linear complementary problem -- A trust region method -- Duality -- Exercises -- Chapter 26: Interpolation and Approximation -- Polynomial Interpolation -- Lagrange interpolation -- Newton interpolation -- Limitations of single-polynomial interpolation -- Hermite interpolation -- Piecewise Polynomial Interpolation -- Piecewise cubic interpolation -- Spline interpolation -- Interpolation of Multivariate Functions -- Piecewise bilinear interpolation -- Piecewise bicubic interpolation -- A Note on Approximation of Functions -- Modelling of Curves and Surfaces* -- Exercises -- Chapter 27: Basic Methods of Numerical Integration -- Newton-Cotes Integration Formulae -- Mid-point rule -- Trapezoidal rule -- Simpson's rules -- Richardson Extrapolation and Romberg Integration -- Further Issues -- Exercises -- Chapter 28: Advanced Topics in Numerical Integration* -- Gaussian Quadrature -- Gauss-Legendre quadrature -- Weight functions in Gaussian quadrature -- Multiple Integrals -- Double integral on rectangular domain -- Monte Carlo integration -- Exercises -- Chapter 29: Numerical Solution of Ordinary Differential Equations -- Single-Step Methods -- Euler's method -- Improved Euler's method or Heun's method -- Runge-Kutta methods -- Practical Implementation of Single-Step Methods…”
Libro electrónico -
222Publicado 2023Tabla de Contenidos: “…About the Editor vii -- Preface to "Symmetric Distributions, Moments and Applications" ix -- Zivorad Tomovski -- Special Issue Editorial "Symmetric Distributions, Moments and Applications" -- Reprinted from: Symmetry 2022, 14, 1863, doi:10.3390/sym14091863 1 -- Robert Frontczak and Zivorad Tomovski -- ˇ -- Convolutions for Bernoulli and Euler-Genocchi Polynomials of Order (r,m) and Their -- Probabilistic Interpretation † -- Reprinted from: Symmetry 2022, 14, 1220, doi:10.3390/sym14061220 5 -- Mohamed S. …”
Libro electrónico -
223
-
224Publicado 2020“…¿Cómo eran los dioses de Aristóteles, Averroes, Copérnico, Kepler, Galileo, Descartes, Leibniz, Pascal, Newton, Euler, Laplace, Faraday, Maxwell, Boltzmann, Einstein, Planck, Heisenberg, Schrödinger, Dirac, y tantos otros venerados hoy como genios de la física? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad de Navarra, Universidad Loyola - Universidad Loyola Granada)Libro -
225por Domínguez, ConsueloTabla de Contenidos: “…LOS LOGARITMOS Y LA CUADRATURA DE (...); 2.3.3. LEONHARD EULER: LA FUNCIÓN LOGARÍTMICA…”
Publicado 2012
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
226Publicado 2014Tabla de Contenidos: “…Calculus of Variations; Euler-Lagrange equation; 1.7.1. Euler-Lagrange equation; 1.7.2. …”
Libro electrónico -
227por Thorby, DouglasTabla de Contenidos: “…Chapter 3 The Linear Single Degree of Freedom System: Response in the Time Domain3.1 Exact analytical methods; 3.1.1 The Laplace transform method; 3.1.2 The convolution or Duhamel integral; 3.1.3 Listings of standard responses; 3.2 'Semi-analytical' methods; 3.2.1 Impulse response method; 3.2.2 Straight-line approximation to input function; 3.2.3 Superposition of standard responses; 3.3 Step-by-step numerical methods using approximate derivatives; 3.3.1 Euler method; 3.3.2 Modified Euler method; 3.3.3 Central difference method; 3.3.4 The Runge-Kutta method…”
Publicado 2008
Libro electrónico -
228Publicado 2002Tabla de Contenidos: “…-- The Rise of Cognitive Modelling -- Modelling and Simulation -- The Role of Cognitive Modelling -- Further Benefits of Cognitive Modelling -- Some Objections to Cognitive Modelling -- Approaches to Cognitive Modelling -- Strategies for the Use of Simulation -- Closing Remarks -- Further Reading -- 2 An Introduction to COGENT -- COGENT: Principal Features -- An Illustrative Task: Free Recall -- Getting Started -- Specifying Basic Experimenter Functions -- The Modal Model in COGENT -- Representation and Variable Binding -- Augmenting the Experiment Environment -- Extending the Modal Model -- Further Reading -- II Modelling in Specific Domains -- Overview -- 3 Arithmetic: A Cognitive Skill -- Cognitive Skills -- Multicolumn Addition -- Multicolumn Subtraction -- General Discussion -- Further Reading -- Appendix: Rules for Execute Action -- 4 Problem Solving -- The Psychology of Problem Solving -- The Missionaries and Cannibals Problem -- The Tower of Hanoi -- Toward a General Problem Solver -- Further Reading -- 5 Deductive Reasoning -- Introduction -- Basic Effects in Human Deductive Reasoning -- Syllogistic Reasoning with Mental Models -- Building a Mental Model -- Revising a Mental Model -- Project: Reasoning as Problem Solving -- Syllogistic Reasoning with Euler Circles -- General Discussion -- Further Reading -- 6 Decision Making -- The Psychology of Decision Making -- Medical Diagnosis -- Incorporating Cue Selection -- Medical Diagnosis by Hypothesis Testing -- Taking Stock -- Further Reading -- 7 Sentence Processing -- Background -- A First Model -- Towards Incremental Interpretation -- Serial Parsing -- Alternative Approaches to Sentence Processing -- Further Reading -- 8 Executive Processes -- The Domain of Executive Processes -- Basic Psychological Findings -- A Framework -- Modelling the Supervisory Attentional System -- Monitoring and the Six Element Test -- Alternative Views of Executive Processes -- Summary -- Further Reading -- III Reflections -- 9 Reflections -- An Assessment of Progress -- Emergent Issues -- Methodologies for Modelling -- Issues for COGENT -- An Agenda -- Closing Remarks…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
229Publicado 2018Tabla de Contenidos: “…Intro -- 1 Introduction -- Geometric curvature energies: facts, trends, and open problems -- 2.1 Facts -- 2.2 Trends and open problems -- Bibliography -- On Möbius invariant decomposition of the Möbius energy -- 3.1 O'Hara's knot energies -- 3.2 Freedman-He-Wang's procedure and the Kusner-Sullivan conjecture -- 3.3 Basic properties of the Möbius energy -- 3.4 The Möbius invariant decomposition -- 3.4.1 The decomposition -- 3.4.2 Variational formulae -- 3.4.3 The Möbius invariance -- Bibliography -- Pseudogradient Flows of Geometric Energies -- 4.1 Introduction -- 4.2 Banach Bundles -- 4.2.1 General Fiber Bundles -- 4.2.2 Banach Bundles and Hilbert Bundles -- 4.3 Riesz Structures -- 4.3.1 Riesz Structures -- 4.3.2 Riesz Bundle Structures -- 4.3.3 Riesz Manifolds -- 4.4 Pseudogradient Flow -- 4.5 Applications -- 4.5.1 Minimal Surfaces -- 4.5.2 Elasticae -- 4.5.3 Euler-Bernoulli Energy and Euler Elastica -- 4.5.4 Willmore Energy -- 4.6 Final Remarks -- Bibliography -- Discrete knot energies -- 5.1 Introduction -- 5.1.1 Notation -- 5.2 Möbius Energy -- 5.3 Integral Menger Curvature -- 5.4 Thickness -- A.1 Appendix: Postlude in -convergence -- Bibliography -- Khovanov homology and torsion -- 6.1 Introduction -- 6.2 Definition and structure of Khovanov link homology -- 6.3 Torsion of Khovanov link homology -- 6.4 Homological invariants of alternating and quasi-alternating cobordisms -- Bibliography -- Quadrisecants and essential secants of knots -- 7.1 Introduction -- 7.2 Quadrisecants -- 7.2.1 Essential secants -- 7.2.2 Results about quadrisecants -- 7.2.3 Counting quadrisecants and quadrisecant approximations. -- 7.3 Key ideas in showing quadrisecants exist -- 7.3.1 Trisecants and quadrisecants. -- 7.3.2 Structure of the set of trisecants. -- 7.4 Applications of essential secants and quadrisecants -- 7.4.1 Total curvature -- 7.4.2 Second Hull…”
Libro electrónico -
230Publicado 2018Tabla de Contenidos: “…TEORÍA DE CONJUNTOS -- 1.1 DEFINICIONES INICIALES -- 1.2 RELACIONES ENTRE CONJUNTOS -- 1.3 OPERACIONES ENTRE CONJUNTOS -- 1.4 DIAGRAMAS DE VENN EULER -- 1.5 APLICACIONES DE LOS CONJUNTOS EN LA SOLUCIÓN DE (...) -- 1.6 EJERCICIOS DE PRÁCTICA I -- 1.7 MATEMÁTICAS EN LA WEB -- 2. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
231
-
232por Tzafestas, S. G., 1939-Tabla de Contenidos: “…3 Mobile Robot Dynamics 3.1 Introduction; 3.2 General Robot Dynamic Modeling; 3.2.1 Newton-Euler Dynamic Model; 3.2.2 Lagrange Dynamic Model; 3.2.3 Lagrange Model of a Multilink Robot; 3.2.4 Dynamic Modeling of Nonholonomic Robots; 3.3 Differential-Drive WMR; 3.3.1 Newton-Euler Dynamic Model; 3.3.2 Lagrange Dynamic Model; 3.3.3 Dynamics of WMR with Slip; 3.4 Car-Like WMR Dynamic Model; 3.5 Three-Wheel Omnidirectional Mobile Robot; 3.6 Four Mecanum-Wheel Omnidirectional Robot; References; 4 Mobile Robot Sensors; 4.1 Introduction; 4.2 Sensor Classification and Characteristics…”
Publicado 2014
Libro electrónico -
233Publicado 2010Tabla de Contenidos: “…EL CONTEXTO GENERAL DE LA CLASIFICACIÓN DE FUNCIONES -- 1.1. EULER Y LA PRIMERA CLASIFICACIÓN DE FUNCIONES -- 1.2. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
234Publicado 2021“…In the first contribution, Morbiducci and co-workers discuss the theoretical and methodological bases supporting the Lagrangian- and Euler-based methods, highlighting their application to cardiovascular flows. …”
Libro electrónico -
235Publicado 2009Tabla de Contenidos: “…General introduction to cultural transmission : developmental, psychological, social and methodological aspects / Ute Schönpflug -- Cultural transmission : a short history of research and theory / Ute Schönpflug -- Evolutionary perspective -- Cultural transmission : a view from chimpanzees and human infants / Michael Tomasello -- Transmission, self-organization, and the emergence of language : a dynamic systems point of view / Paul van Geert -- Relationship-specific intergenerational family ties : an evolutionary approach to the structure of cultural transmission / Harald A. Euler, Sabine Hoier, and Percy A. Rohde -- Cross-cultural perspective -- An ecocultural perspective on cultural transmission : the family across cultures / John W. …”
Libro electrónico -
236Publicado 2017Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
Libro electrónico -
237por García, IsaacTabla de Contenidos: “…Introducción; 8.3. Ecuaciones de Euler-Lagrange; 8.4. Extremos con restricciones; 8.5. …”
Publicado 2005
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
238Publicado 2019Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Acknowledgments -- Preface -- Chapter 1 Basic Numerical Methods -- 1.1 Introduction -- 1.2 Ordinary Differential Equation -- 1.3 Euler Method -- 1.4 Improved Euler Method -- 1.5 Runge-Kutta Methods -- 1.5.1 Midpoint Method -- 1.5.2 Runge-Kutta Fourth Order -- 1.6 Multistep Methods -- 1.6.1 Adams-Bashforth Method -- 1.6.2 Adams-Moulton Method -- 1.7 Higher‐Order ODE -- References -- Chapter 2 Integral Transforms -- 2.1 Introduction -- 2.2 Laplace Transform -- 2.2.1 Solution of Differential Equations Using Laplace Transforms -- 2.3 Fourier Transform -- 2.3.1 Solution of Partial Differential Equations Using Fourier Transforms -- References -- Chapter 3 Weighted Residual Methods -- 3.1 Introduction -- 3.2 Collocation Method -- 3.3 Subdomain Method -- 3.4 Least‐square Method -- 3.5 Galerkin Method -- 3.6 Comparison of WRMs -- References -- Chapter 4 Boundary Characteristics Orthogonal Polynomials -- 4.1 Introduction -- 4.2 Gram-Schmidt Orthogonalization Process -- 4.3 Generation of BCOPs -- 4.4 Galerkin's Method with BCOPs -- 4.5 Rayleigh-Ritz Method with BCOPs -- References -- Chapter 5 Finite Difference Method -- 5.1 Introduction -- 5.2 Finite Difference Schemes -- 5.2.1 Finite Difference Schemes for Ordinary Differential Equations -- 5.2.1.1 Forward Difference Scheme -- 5.2.1.2 Backward Difference Scheme -- 5.2.1.3 Central Difference Scheme -- 5.2.2 Finite Difference Schemes for Partial Differential Equations -- 5.3 Explicit and Implicit Finite Difference Schemes -- 5.3.1 Explicit Finite Difference Method -- 5.3.2 Implicit Finite Difference Method -- References -- Chapter 6 Finite Element Method -- 6.1 Introduction -- 6.2 Finite Element Procedure -- 6.3 Galerkin Finite Element Method -- 6.3.1 Ordinary Differential Equation -- 6.3.2 Partial Differential Equation -- 6.4 Structural Analysis Using FEM…”
Libro electrónico -
239por Rivera Figueroa, AntonioTabla de Contenidos: “….; 4.7.1.1 Postulado de continuidad (teorema de Weierstrass); 4.7.1.2 Teorema (criterio de Cauchy); 4.8 Algunas sucesiones especiales; 4.8.1 La sucesión a; 4.8.2 La sucesión an; 4.8.3 La sucesión n; 4.8.4 Número e de Euler…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
240Publicado 2014Tabla de Contenidos: “…Cover -- Copyright -- Contents -- About the author -- Preface -- Chapter 1: Modelling theory -- 1.1 Context and Nature of Modelling -- 1.1.1 Classification of models -- 1.1.2 Computational Hydraulics -- 1.2 Conceptualiation: Building a Model -- 1.3 Mathematical Modelling in Practice -- 1.3.1 Selecting a proper model -- 1.3.2 Testing a model -- 1.4 Development and Application of Models -- Chapter 2: Modelling water related problems -- 2.1 Basic Conservation Equations -- 2.1.1 Conservation of mass -- 2.1.2 Conservation of momentum -- 2.1.3 Conservation of energy -- 2.2 Mathematical Classification of Flow Equations -- 2.2.1 Solutions of ODE -- 2.2.2 Solutions of PDE -- 2.3 Navier-Stokes and Saint-Venant Equations -- 2.3.1 Navier-Stokes equations -- 2.3.2 Saint-Venant equations -- 2.3.3 Characteristic form of Saint-Venant equations -- Chapter 3: Discretization of the fluid flow domain -- 3.1 Discrete Solutions of Equations -- 3.2 Space Discretization -- 3.2.1 Structured grids -- 3.2.2 Unstructured grids -- 3.2.3 Grid generation -- 3.2.4 Physical aspects of space discretization -- 3.3 Time Discretization -- Chapter 4: Finite difference method -- 4.1 General Concepts -- 4.2 Approximation of the First Order Derrivative -- 4.3 Approximation of Higher Order Derrivatives -- 4.4 Finite Differences for Ordinary Differential Equations -- 4.4.1 Problem position -- 4.4.2 Explicit schemes (Euler method) -- 4.4.3 Implicit schemes (Improved Euler method) -- 4.4.4 Mixed schemes -- 4.4.5 Weighted averaged schemes -- 4.4.6 Runge-Kutta methods -- 4.5 Numerical Schemes for Partial Differential Equations -- 4.5.1 Principle of FDM for PDEs -- 4.5.2 Hyperbolic PDEs -- 4.5.3 Parabolic PDEs -- 4.5.4 Elliptic PDEs -- 4.6 Examples -- 4.6.1 ODE: Solution of the linear reservoir problem -- 4.6.2 PDE: Simple wave propagation -- 4.6.3 PDE: Diffusion equation…”
Libro electrónico