We introduce a sub-cell WENO reconstruction method to evaluate spatial derivatives in the high-order ADER scheme. The basic idea in our reconstruction is to use only r stencils to reconstruct the point-wise values of solutions and spatial derivatives for the 2r-1 th order ADER scheme in one dimension, while in two dimensions, the dimension-by-dimension sub-cell reconstruction approach for spatial derivatives is employed. Compared with the original ADER scheme of Toro and Titarev (2002) [2] that uses the direct derivatives of reconstructed polynomials for solutions to evaluate spatial derivatives, our method not only reduces greatly the computational costs of the ADER scheme on a given mesh, but also avoids possible numerical oscillations near discontinuities, as demonstrated by a number of one- and two-dimensional numerical tests. All these tests show that the 5th-order ADER scheme based on our sub-cell reconstruction method achieves the desired accuracy, and is essentially non-oscillatory and computationally cheaper for problems with discontinuities.
標簽: 高精度格式
上傳時間: 2016-01-13
上傳用戶:ccsdcczd
Guided vehicles (GVs) are commonly used for the internal transportation of loads in warehouses, production plants and terminals. These guided vehicles can be routed with a variety of vehicle dispatching rules in an attempt to meet performance criteria such as minimizing the average load waiting times. In this research, we use simulation models of three companies to evaluate the performance of several real-time vehicle dispatching rules, in part described in the literature. It appears that there is a clear difference in average load waiting time between the different dispatching rules in the different environments. Simple rules, based on load and vehicle proximity (distance-based) perform best for all cases. The penalty for this is a relatively high maximum load waiting time. A distance-based rule with time truncation, giving more priority to loads that have to wait longer than a time threshold, appears to yield the best possible overall performance. A rule that particularly considers load-waiting time performs poor overall. We also show that using little pre-arrival information of loads leads to a significant improvement in the performance of the dispatching rules without changing their performance ranking.
標簽: Testing and classifying vehicle dispatching rules in three real-world settings
上傳時間: 2016-04-01
上傳用戶:五塊錢的油條
Two 2D phase unwrapping approaches are included: 1. Phase quality guided path following method. 2. Goldstein's branch cut method. The algorithms are described in: D. C. Ghiglia and M. D. Pritt, Two-Dimensional Phase Unwrapping: Theory, Algorithms and Software. New York: Wiley-Interscience, 1998.
標簽: Unwrapping Phase 2D
上傳時間: 2016-04-30
上傳用戶:seanjsj
Design and Control of an LCL-filter-based three-phase active rectifier 早期的文章
標簽: LCL-filter-based three-phase rectifier control Design active and an of
上傳時間: 2018-05-19
上傳用戶:wangweiyaorui
The AZ1117 is a series of low dropout three-terminal regulators with a dropout of 1.15V at 1A output current. The AZ1117 series provides current limiting and thermal shutdown. Its circuit includes a trimmed bandgap reference to assure output voltage accuracy to be within 1% for 1.5V, 1.8V, 2.5V, 2.85V, 3.3V, 5.0V and adjustable versions or 2% for 1.2V version. Current limit is trimmed to ensure specified output current and controlled short-circuit current. On-chip thermal shutdown provides protection against any combination of overload and ambient temperature that would create excessive junction temperature. The AZ1117 has an adjustable version, that can provide the output voltage from 1.25V to 12V with only 2 external resistors.
上傳時間: 2019-04-11
上傳用戶:heaven0o0o0
The rapid growth of the Web in the past two decades has made it the larg- est publicly accessible data source in the world. Web mining aims to dis- cover useful information or knowledge from Web hyperlinks, page con- tents, and usage logs. Based on the primary kinds of data used in the mining process, Web mining tasks can be categorized into three main types: Web structure mining, Web content mining and Web usage mining.
上傳時間: 2020-05-26
上傳用戶:shancjb
Homogeneous Partitioning of the Surveillance Volume discusses the implementation of the first of three sequentially complementary approaches for increasing the probability of target detection within at least some of the cells of the surveillance volume for a spatially nonGaussian or Gaussian “noise” environment that is temporally Gaussian. This approach, identified in the Preface as Approach A, partitions the surveillance volume into homogeneous contiguous subdivisions.
標簽: Receivers Adaptive Antennas and
上傳時間: 2020-05-26
上傳用戶:shancjb
Wireless penetration has witnessed explosive growth over the last two decades. Accordingly, wireless devices have become much denser per unit area, resulting in an overcrowded usage of wireless resources. To avoid radio interferences and packet collisions, wireless stations have to exchange control messages to coordinate well. The existing wisdoms of conveying control messages could be classified into three categories: explicit, implicit, or hybrid.
標簽: Transmission Attachment Networks Wireless in
上傳時間: 2020-05-26
上傳用戶:shancjb
The idea of the book was born during the time when the second generation cellular system was looming on the horizon.At that time ,the world was divided into three distinct camps as far as looking for a standard: Europe North America and Japan.
標簽: Designing Cellular Systems Mobile Radio
上傳時間: 2020-05-26
上傳用戶:shancjb
At the time of writing, and to an extent never seen before, there is an expectation that almost any information or service that is available through communication systems in the office or home will be available wherever the user happens to be. This is placing incredible demands on wireless communications and has been the driver for the gen- esis and deployment of three generations of cellular systems in the space of 20 years.
標簽: Deploying Wireless Networks
上傳時間: 2020-05-27
上傳用戶:shancjb
蟲蟲下載站版權(quán)所有 京ICP備2021023401號-1