This study discusses generalized Rayleigh quotient and high efficiency finite element discretization schemes. Some results are as follows: 1) Rayleigh quotient accelerate technique is extended to nonselfadjoint proble...This study discusses generalized Rayleigh quotient and high efficiency finite element discretization schemes. Some results are as follows: 1) Rayleigh quotient accelerate technique is extended to nonselfadjoint problems. Generalized Rayleigh quotients of operator form and weak form are defined and the basic relationship between approximate eigenfunction and its generalized Rayleigh quotient is established. 2) New error estimates are obtained by replacing the ascent of exact eigenvalue with the ascent of finite element approximate eigenvalue. 3) Based on the work of Xu Jinchao and Zhou Aihui, finite element two-grid discretization schemes are established to solve nonselfadjoint elliptic differential operator eigenvalue problems and these schemes are used in both conforming finite element and non-conforming finite element. Besides, the efficiency of the schemes is proved by both theoretical analysis and numerical experiments. 4) Iterated Galerkin method, interpolated correction method and gradient recovery for selfadjoint elliptic differential operator eigenvalue problems are extended to nonselfadjoint elliptic differential operator eigenvalue problems.展开更多
This paper extends the two-grid discretization scheme of the conforming finite elements proposed by Xu and Zhou (Math. Comput., 70 (2001), pp.17-25) to the nonconforming finite elements for eigenvalue problems. In...This paper extends the two-grid discretization scheme of the conforming finite elements proposed by Xu and Zhou (Math. Comput., 70 (2001), pp.17-25) to the nonconforming finite elements for eigenvalue problems. In particular, two two-grid discretization schemes based on Rayleigh quotient technique are proposed. By using these new schemes, the solution of an eigenvalue problem on a fine mesh is reduced to that on a much coarser mesh together with the solution of a linear algebraic system on the fine mesh. The resulting solution still maintains an asymptotically optimal accuracy. Comparing with the two-grid discretization scheme of the conforming finite elements, the main advantages of our new schemes are twofold when the mesh size is small enough. First, the lower bounds of the exact eigenvalues in our two-grid discretization schemes can be obtained. Second, the first eigenvalue given by the new schemes has much better accuracy than that obtained by solving the eigenvalue problems on the fine mesh directly.展开更多
In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propos...In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.展开更多
The authors announce a newly-proved theorem of theirs. This theorem is of principal significance to numerical computation of operator equations of the first kind.
We construct new fifth-order alternative WENO(A-WENO)schemes for the Euler equations of gas dynamics.The new scheme is based on a new adaptive diffusion centralupwind Rankine-Hugoniot(CURH)numerical flux.The CURH nume...We construct new fifth-order alternative WENO(A-WENO)schemes for the Euler equations of gas dynamics.The new scheme is based on a new adaptive diffusion centralupwind Rankine-Hugoniot(CURH)numerical flux.The CURH numerical fluxes have been recently proposed in[Garg et al.J Comput Phys 428,2021]in the context of secondorder semi-discrete finite-volume methods.The proposed adaptive diffusion CURH flux contains a smaller amount of numerical dissipation compared with the adaptive diffusion central numerical flux,which was also developed with the help of the discrete RankineHugoniot conditions and used in the fifth-order A-WENO scheme recently introduced in[Wang et al.SIAM J Sci Comput 42,2020].As in that work,we here use the fifth-order characteristic-wise WENO-Z interpolations to evaluate the fifth-order point values required by the numerical fluxes.The resulting one-and two-dimensional schemes are tested on a number of numerical examples,which clearly demonstrate that the new schemes outperform the existing fifth-order A-WENO schemes without compromising the robustness.展开更多
It is a major challenge for the airframe-inlet design of modern combat aircrafts,as the flow and electromagnetic wave propagation in the inlet of stealth aircraft are very complex.In this study,an aerodynamic/stealth ...It is a major challenge for the airframe-inlet design of modern combat aircrafts,as the flow and electromagnetic wave propagation in the inlet of stealth aircraft are very complex.In this study,an aerodynamic/stealth optimization design method for an S-duct inlet is proposed.The upwind scheme is introduced to the aerodynamic adjoint equation to resolve the shock wave and flow separation.The multilevel fast multipole algorithm(MLFMA)is utilized for the stealth adjoint equation.A dorsal S-duct inlet of flying wing layout is optimized to improve the aerodynamic and stealth characteristics.Both the aerodynamic and stealth characteristics of the inlet are effectively improved.Finally,the optimization results are analyzed,and it shows that the main contradiction between aerodynamic characteristics and stealth characteristics is the centerline and crosssectional area.The S-duct is smoothed,and the cross-sectional area is increased to improve the aerodynamic characteristics,while it is completely opposite for the stealth design.The radar cross section(RCS)is reduced by phase cancelation for low frequency conditions.The method is suitable for the aerodynamic/stealth design of the aircraft airframe-inlet system.展开更多
Numerical diffusion and oscillatory behavior characteristics are averted applying numerical solutions of advection-diffusion equation are themselves immensely sophisticated. In this paper, two numerical methods have b...Numerical diffusion and oscillatory behavior characteristics are averted applying numerical solutions of advection-diffusion equation are themselves immensely sophisticated. In this paper, two numerical methods have been used to solve the advection diffusion equation. We use an explicit finite difference scheme for the advection diffusion equation and semi-discretization on the spatial variable for advection-diffusion equation yields a system of ordinary differential equations solved by Euler’s method. Numerical assessment has been executed with specified initial and boundary conditions, for which the exact solution is known. We compare the solutions of the advection diffusion equation as well as error analysis for both schemes.展开更多
Although the He Kiesler signature is said to be proposed based on the discrete logarithm problem and the factorization problem, it has been proved that the signature is not as secure as it was stated to be. A new sig...Although the He Kiesler signature is said to be proposed based on the discrete logarithm problem and the factorization problem, it has been proved that the signature is not as secure as it was stated to be. A new signature scheme is here proposed based on the discrete logarithm problem and the factorization problem to enhance the security of the He Kiesler signature.展开更多
By deriving the discrete equation of the parameterized equation for the New Medium-Range Forecast(NMRF)boundary layer scheme in the GRAPES model,the adjusted discrete equation for temperature is obviously different fr...By deriving the discrete equation of the parameterized equation for the New Medium-Range Forecast(NMRF)boundary layer scheme in the GRAPES model,the adjusted discrete equation for temperature is obviously different from the original equation under the background of hydrostatic equilibrium and adiabatic hypothesis.In the present research,three discrete equations for temperature in the NMRF boundary layer scheme are applied,namely the original(hereafter NMRF),the adjustment(hereafter NMRF-gocp),and the one in the YSU boundary-layer scheme(hereafter NMRF-TZ).The results show that the deviations of height,temperature,U and V wind in the boundary layer in the NMRF-gocp and NMRF-TZ experiments are smaller than those in the NMRF experiment and the deviations in the NMRF-gocp experiment are the smallest.The deviations of humidity are complex for the different forecasting lead time in the three experiments.Moreover,there are obvious diurnal variations of deviations from these variables,where the diurnal variations of deviations from height and temperature are similar and those from U and V wind are also similar.However,the diurnal variation of humidity is relatively complicated.The root means square errors of 2m temperature(T2m)and 10m speed(V10m)from the three experiments show that the error of NMRF-gocp is the smallest and that of NMRF is the biggest.There is also a diurnal variation of T2m and V10m,where T2m has double peaks and V10m has only one peak.Comparison of the discrete equations between NMRF and NMRF-gocp experiments shows that the deviation of temperature is likely to be caused by the calculation of vertical eddy diffusive coefficients of heating,which also leads to the deviations of other elements.展开更多
Digital signature scheme is a very important research field in computer security and modern cryptography. A (k, n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shamir sec...Digital signature scheme is a very important research field in computer security and modern cryptography. A (k, n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shamir secret sharing scheme. It can realize group-oriented digital signature, and its security is based on the difficulty in computing discrete logarithm and quadratic residue on some special conditions. In this scheme, effective digital signature can not be generated by anyk?1 or fewer legal users, or only by signature executive. In addition, this scheme can identify any legal user who presents incorrect partial digital signature to disrupt correct signature, or any illegal user who forges digital signature. A method of extending this scheme to an Abelian group such as elliptical curve group is also discussed. The extended scheme can provide rapider computing speed and stronger security in the case of using shorter key. Key words threshold scheme - digital signature - discrete logarithm - quadratic residuc - threshold digital signature CLC number TP 309. 7 Foundation item: Supported the National Nature Science Foundation of China, Hubei Province (90104005, 2002 AB0039)Biography: FEI Ru-chun (1964-), male, Ph. D candidate, Associated professor, research direction: information security and cryptography.展开更多
Several kinds of explicit and implicit finite-difference schemes directly solving the discretized velocity distribution functions are designed with precision of different orders by analyzing the inner characteristics ...Several kinds of explicit and implicit finite-difference schemes directly solving the discretized velocity distribution functions are designed with precision of different orders by analyzing the inner characteristics of the gas-kinetic numerical algorithm for Boltzmann model equation. The peculiar flow phenomena and mechanism from various flow regimes are revealed in the numerical simulations of the unsteady Sod shock-tube problems and the two-dimensional channel flows with different Knudsen numbers. The numerical remainder-effects of the difference schemes are investigated aad analyzed based on the computed results. The ways of improving the computational efficiency of the gaskinetic numerical method and the computing principles of difference discretization are discussed.展开更多
In this paper, we consider the upwind difference scheme for singular perturbation problem (1.1). On a special discretization mesh, it is proved that the solution of the upwind difference scheme is first order converge...In this paper, we consider the upwind difference scheme for singular perturbation problem (1.1). On a special discretization mesh, it is proved that the solution of the upwind difference scheme is first order convergent, uniformly in the small parameter e , to the solution of problem (1.1). Numerical results are finally provided.展开更多
This paper proposes a kind of compact extrapolation schemes for a linear Schr?dinger equation. The schemes are convergent with fourth-order accuracy both in space and time. Especially, a specific scheme of sixth-order...This paper proposes a kind of compact extrapolation schemes for a linear Schr?dinger equation. The schemes are convergent with fourth-order accuracy both in space and time. Especially, a specific scheme of sixth-order accuracy in space is given. The stability and discrete invariants of the schemes are analyzed. The schemes satisfy discrete conservation laws of original Schr?dinger equation. The numerical example indicates the efficiency of the new schemes.展开更多
This paper addresses the problem of event-triggered finite-time H<sub>∞</sub> filter design for a class of discrete-time nonlinear stochastic systems with exogenous disturbances. The stochastic Lyapunov-K...This paper addresses the problem of event-triggered finite-time H<sub>∞</sub> filter design for a class of discrete-time nonlinear stochastic systems with exogenous disturbances. The stochastic Lyapunov-Krasoviskii functional method is adopted to design a filter such that the filtering error system is stochastic finite-time stable (SFTS) and preserves a prescribed performance level according to the pre-defined event-triggered criteria. Based on stochastic differential equations theory, some sufficient conditions for the existence of H<sub>∞</sub> filter are obtained for the suggested system by employing linear matrix inequality technique. Finally, the desired H<sub>∞</sub> filter gain matrices can be expressed in an explicit form.展开更多
The collocation method is a widely used numerical method for science and engineering problems governed by partial differential equations.This paper provides a comprehensive review of collocation methods and their appl...The collocation method is a widely used numerical method for science and engineering problems governed by partial differential equations.This paper provides a comprehensive review of collocation methods and their applications,focused on elasticity,heat conduction,electromagnetic field analysis,and fluid dynamics.The merits of the collocation method can be attributed to the need for element mesh,simple implementation,high computational efficiency,and ease in handling irregular domain problems since the collocation method is a type of node-based numerical method.Beginning with the fundamental principles of the collocation method,the discretization process in the continuous domain is elucidated,and how the collocation method approximation solutions for solving differential equations are explained.Delving into the historical development of the collocation methods,their earliest applications and key milestones are traced,thereby demonstrating their evolution within the realm of numerical computation.The mathematical foundations of collocation methods,encompassing the selection of interpolation functions,definition of weighting functions,and derivation of integration rules,are examined in detail,emphasizing their significance in comprehending the method’s effectiveness and stability.At last,the practical application of the collocation methods in engineering contexts is emphasized,including heat conduction simulations,electromagnetic coupled field analysis,and fluid dynamics simulations.These specific case studies can underscore collocation method’s broad applicability and effectiveness in addressing complex engineering challenges.In conclusion,this paper puts forward the future development trend of the collocation method through rigorous analysis and discussion,thereby facilitating further advancements in research and practical applications within these fields.展开更多
基金supported by National Natural Science Foundation of China (Grant No.10761003) the Governor's Special Foundation of Guizhou Province for Outstanding Scientific Education Personnel (Grant No.[2005]155)
文摘This study discusses generalized Rayleigh quotient and high efficiency finite element discretization schemes. Some results are as follows: 1) Rayleigh quotient accelerate technique is extended to nonselfadjoint problems. Generalized Rayleigh quotients of operator form and weak form are defined and the basic relationship between approximate eigenfunction and its generalized Rayleigh quotient is established. 2) New error estimates are obtained by replacing the ascent of exact eigenvalue with the ascent of finite element approximate eigenvalue. 3) Based on the work of Xu Jinchao and Zhou Aihui, finite element two-grid discretization schemes are established to solve nonselfadjoint elliptic differential operator eigenvalue problems and these schemes are used in both conforming finite element and non-conforming finite element. Besides, the efficiency of the schemes is proved by both theoretical analysis and numerical experiments. 4) Iterated Galerkin method, interpolated correction method and gradient recovery for selfadjoint elliptic differential operator eigenvalue problems are extended to nonselfadjoint elliptic differential operator eigenvalue problems.
基金supported by National Natural Science Foundation of China (No. 10761003)by the Foundation of Guizhou Province Scientific Research for Senior Personnel, China
文摘This paper extends the two-grid discretization scheme of the conforming finite elements proposed by Xu and Zhou (Math. Comput., 70 (2001), pp.17-25) to the nonconforming finite elements for eigenvalue problems. In particular, two two-grid discretization schemes based on Rayleigh quotient technique are proposed. By using these new schemes, the solution of an eigenvalue problem on a fine mesh is reduced to that on a much coarser mesh together with the solution of a linear algebraic system on the fine mesh. The resulting solution still maintains an asymptotically optimal accuracy. Comparing with the two-grid discretization scheme of the conforming finite elements, the main advantages of our new schemes are twofold when the mesh size is small enough. First, the lower bounds of the exact eigenvalues in our two-grid discretization schemes can be obtained. Second, the first eigenvalue given by the new schemes has much better accuracy than that obtained by solving the eigenvalue problems on the fine mesh directly.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61971348 and 61201194)。
文摘In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.
文摘The authors announce a newly-proved theorem of theirs. This theorem is of principal significance to numerical computation of operator equations of the first kind.
基金The work of B.S.Wang and W.S.Don was partially supported by the Ocean University of China through grant 201712011The work of A.Kurganov was supported in part by NSFC grants 11771201 and 1201101343by the fund of the Guangdong Provincial Key Laboratory of Computational Science and Material Design(No.2019B030301001).
文摘We construct new fifth-order alternative WENO(A-WENO)schemes for the Euler equations of gas dynamics.The new scheme is based on a new adaptive diffusion centralupwind Rankine-Hugoniot(CURH)numerical flux.The CURH numerical fluxes have been recently proposed in[Garg et al.J Comput Phys 428,2021]in the context of secondorder semi-discrete finite-volume methods.The proposed adaptive diffusion CURH flux contains a smaller amount of numerical dissipation compared with the adaptive diffusion central numerical flux,which was also developed with the help of the discrete RankineHugoniot conditions and used in the fifth-order A-WENO scheme recently introduced in[Wang et al.SIAM J Sci Comput 42,2020].As in that work,we here use the fifth-order characteristic-wise WENO-Z interpolations to evaluate the fifth-order point values required by the numerical fluxes.The resulting one-and two-dimensional schemes are tested on a number of numerical examples,which clearly demonstrate that the new schemes outperform the existing fifth-order A-WENO schemes without compromising the robustness.
文摘It is a major challenge for the airframe-inlet design of modern combat aircrafts,as the flow and electromagnetic wave propagation in the inlet of stealth aircraft are very complex.In this study,an aerodynamic/stealth optimization design method for an S-duct inlet is proposed.The upwind scheme is introduced to the aerodynamic adjoint equation to resolve the shock wave and flow separation.The multilevel fast multipole algorithm(MLFMA)is utilized for the stealth adjoint equation.A dorsal S-duct inlet of flying wing layout is optimized to improve the aerodynamic and stealth characteristics.Both the aerodynamic and stealth characteristics of the inlet are effectively improved.Finally,the optimization results are analyzed,and it shows that the main contradiction between aerodynamic characteristics and stealth characteristics is the centerline and crosssectional area.The S-duct is smoothed,and the cross-sectional area is increased to improve the aerodynamic characteristics,while it is completely opposite for the stealth design.The radar cross section(RCS)is reduced by phase cancelation for low frequency conditions.The method is suitable for the aerodynamic/stealth design of the aircraft airframe-inlet system.
文摘Numerical diffusion and oscillatory behavior characteristics are averted applying numerical solutions of advection-diffusion equation are themselves immensely sophisticated. In this paper, two numerical methods have been used to solve the advection diffusion equation. We use an explicit finite difference scheme for the advection diffusion equation and semi-discretization on the spatial variable for advection-diffusion equation yields a system of ordinary differential equations solved by Euler’s method. Numerical assessment has been executed with specified initial and boundary conditions, for which the exact solution is known. We compare the solutions of the advection diffusion equation as well as error analysis for both schemes.
文摘Although the He Kiesler signature is said to be proposed based on the discrete logarithm problem and the factorization problem, it has been proved that the signature is not as secure as it was stated to be. A new signature scheme is here proposed based on the discrete logarithm problem and the factorization problem to enhance the security of the He Kiesler signature.
基金National Key R&D Program of China(2018YFC1506902)National Natural Science Foundation of China(42175105,U2142213)Special Fund of China Meteorological Administration for Innovation and Development(CXFZ2021Z006)。
文摘By deriving the discrete equation of the parameterized equation for the New Medium-Range Forecast(NMRF)boundary layer scheme in the GRAPES model,the adjusted discrete equation for temperature is obviously different from the original equation under the background of hydrostatic equilibrium and adiabatic hypothesis.In the present research,three discrete equations for temperature in the NMRF boundary layer scheme are applied,namely the original(hereafter NMRF),the adjustment(hereafter NMRF-gocp),and the one in the YSU boundary-layer scheme(hereafter NMRF-TZ).The results show that the deviations of height,temperature,U and V wind in the boundary layer in the NMRF-gocp and NMRF-TZ experiments are smaller than those in the NMRF experiment and the deviations in the NMRF-gocp experiment are the smallest.The deviations of humidity are complex for the different forecasting lead time in the three experiments.Moreover,there are obvious diurnal variations of deviations from these variables,where the diurnal variations of deviations from height and temperature are similar and those from U and V wind are also similar.However,the diurnal variation of humidity is relatively complicated.The root means square errors of 2m temperature(T2m)and 10m speed(V10m)from the three experiments show that the error of NMRF-gocp is the smallest and that of NMRF is the biggest.There is also a diurnal variation of T2m and V10m,where T2m has double peaks and V10m has only one peak.Comparison of the discrete equations between NMRF and NMRF-gocp experiments shows that the deviation of temperature is likely to be caused by the calculation of vertical eddy diffusive coefficients of heating,which also leads to the deviations of other elements.
文摘Digital signature scheme is a very important research field in computer security and modern cryptography. A (k, n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shamir secret sharing scheme. It can realize group-oriented digital signature, and its security is based on the difficulty in computing discrete logarithm and quadratic residue on some special conditions. In this scheme, effective digital signature can not be generated by anyk?1 or fewer legal users, or only by signature executive. In addition, this scheme can identify any legal user who presents incorrect partial digital signature to disrupt correct signature, or any illegal user who forges digital signature. A method of extending this scheme to an Abelian group such as elliptical curve group is also discussed. The extended scheme can provide rapider computing speed and stronger security in the case of using shorter key. Key words threshold scheme - digital signature - discrete logarithm - quadratic residuc - threshold digital signature CLC number TP 309. 7 Foundation item: Supported the National Nature Science Foundation of China, Hubei Province (90104005, 2002 AB0039)Biography: FEI Ru-chun (1964-), male, Ph. D candidate, Associated professor, research direction: information security and cryptography.
基金supported by the National Natural Science Foundation of China (No.10621062)the Research Fund for Next Generation of General Armament Department (No.9140A13050207KG29)
文摘Several kinds of explicit and implicit finite-difference schemes directly solving the discretized velocity distribution functions are designed with precision of different orders by analyzing the inner characteristics of the gas-kinetic numerical algorithm for Boltzmann model equation. The peculiar flow phenomena and mechanism from various flow regimes are revealed in the numerical simulations of the unsteady Sod shock-tube problems and the two-dimensional channel flows with different Knudsen numbers. The numerical remainder-effects of the difference schemes are investigated aad analyzed based on the computed results. The ways of improving the computational efficiency of the gaskinetic numerical method and the computing principles of difference discretization are discussed.
文摘In this paper, we consider the upwind difference scheme for singular perturbation problem (1.1). On a special discretization mesh, it is proved that the solution of the upwind difference scheme is first order convergent, uniformly in the small parameter e , to the solution of problem (1.1). Numerical results are finally provided.
基金The Director Innovation Foundation of ICMSEC and AMSS, the Foundation of CAS, the NNSFC (No. 91130003, No. 11021101) and the NSF of Shandong Province (No. ZR2013AQ005, No. BS2013HZ026)
文摘This paper proposes a kind of compact extrapolation schemes for a linear Schr?dinger equation. The schemes are convergent with fourth-order accuracy both in space and time. Especially, a specific scheme of sixth-order accuracy in space is given. The stability and discrete invariants of the schemes are analyzed. The schemes satisfy discrete conservation laws of original Schr?dinger equation. The numerical example indicates the efficiency of the new schemes.
文摘This paper addresses the problem of event-triggered finite-time H<sub>∞</sub> filter design for a class of discrete-time nonlinear stochastic systems with exogenous disturbances. The stochastic Lyapunov-Krasoviskii functional method is adopted to design a filter such that the filtering error system is stochastic finite-time stable (SFTS) and preserves a prescribed performance level according to the pre-defined event-triggered criteria. Based on stochastic differential equations theory, some sufficient conditions for the existence of H<sub>∞</sub> filter are obtained for the suggested system by employing linear matrix inequality technique. Finally, the desired H<sub>∞</sub> filter gain matrices can be expressed in an explicit form.
基金the National Natural Science Foundation of China for financial support to this work under Grant NSFC No.12072064.
文摘The collocation method is a widely used numerical method for science and engineering problems governed by partial differential equations.This paper provides a comprehensive review of collocation methods and their applications,focused on elasticity,heat conduction,electromagnetic field analysis,and fluid dynamics.The merits of the collocation method can be attributed to the need for element mesh,simple implementation,high computational efficiency,and ease in handling irregular domain problems since the collocation method is a type of node-based numerical method.Beginning with the fundamental principles of the collocation method,the discretization process in the continuous domain is elucidated,and how the collocation method approximation solutions for solving differential equations are explained.Delving into the historical development of the collocation methods,their earliest applications and key milestones are traced,thereby demonstrating their evolution within the realm of numerical computation.The mathematical foundations of collocation methods,encompassing the selection of interpolation functions,definition of weighting functions,and derivation of integration rules,are examined in detail,emphasizing their significance in comprehending the method’s effectiveness and stability.At last,the practical application of the collocation methods in engineering contexts is emphasized,including heat conduction simulations,electromagnetic coupled field analysis,and fluid dynamics simulations.These specific case studies can underscore collocation method’s broad applicability and effectiveness in addressing complex engineering challenges.In conclusion,this paper puts forward the future development trend of the collocation method through rigorous analysis and discussion,thereby facilitating further advancements in research and practical applications within these fields.