Jasmin Smajic 1, Christian Hafner 2, Jürg Leuthold 2, March 16, 2015 Introduction to Finite Element Method (FEM) Part 1 (2-D FEM)
|
|
- Benedict Perry
- 6 years ago
- Views:
Transcription
1 Jasmin Smajic 1, Christian Hafner 2, Jürg Leuthold 2, March 16, 2015 Introduction to Finite Element Method (FEM) Part 1 (2-D FEM) 1 HSR - University of Applied Sciences of Eastern Switzerland Institute of Energy Technology (IET) Obersstrasse 10, Rapperswil, Switzerland jasmin.smajic@hsr.ch 2 Swiss Federal Institute of Technology (ETH) Institute of Electromagnetic Fields (IEF) Gloriastrasse 35, CH-8092 Zürich, Switzerland christian.hafner@ief..ethz.ch, juerg.leuthold@ief..ethz.ch
2 Contents (1) Introduction: finite elements in Nature Boundary value problem (BVP) - strong form FEM discretization of the 2-D BVP Equivalent integral form - weak form Domain subdivision Approximation of the unknown function Mesh topology Approximation of a scalar function Isolines of the approximated function Weak form discretization Selection of the weighting functions Matrix assembly Matrix structure and solution methods
3 Contents (2) FEM sparse linear system of equations Numerical examples (2-D scalar FEM) Electrostatic analysis and capacitance calculation Analysis of waveguide discontinuities Summary
4 Introduction Finite Elements in Nature Ancient lakebed with cracked dried mud, Black Rock Desert, Nevada, USA.
5 Introduction Finite Elements in Nature Cracked mud and shallow pond, near Mitzpe Ramon, Negev Desert, Israel.
6 Boundary Value Problem (BVP) General 2-D Form (Strong Form) The PDE of second order along with the corresponding BCs form the BVP: αα xx αα yy + ββββ = ff, xx, yy Ω RR2 ΦΦ xx, yy = pp, (xx, yy) DD Ω αα xx xx xx + αα yy yy yy nn = qq, (xx, yy) NN Ω DD NN = = bbbbbbbbbbbbbbbb() where is the computational domain, αα and ββ are constants representing the material properties, ff is a predefined source term, nn is a normal outward unit vector at a certain point on the Neumann boundary, and ΦΦ is an unknown function.
7 FEM Discretization of the 2-D BVP Equivalent Integral Form (Weak Form) The method of weighted residuals is used in order to obtain an equivalent integral form of the 2-D BVP: ww ii αα xx αα yy + ββββ ff dd + + DD Ω ww ii ΦΦ pp dddd + NN ww ii αα xx xx xx + αα yy yy yy nn qq dddd = 0 DD NN = = bbbbbbbbbbbbbbbb() where ww ii = ww ii xx, yy, ii = 1,2,, NN are so called weighting functions.
8 FEM Discretization of the 2-D BVP Equivalent Integral Form (Weak Form) Mathematical transformation of the first integral: II 1 = ww ii αα xx II 1 = ww ii αα xx αα yy αα yy + ββββ ff dd dd + ww ii ββββ ff dd = II 11 + II 12 II 11 = ww ii αα xx II 11 = II 11 = ww ii αα yy dd = xx + yy αα xx xx + αα yy yy ww ii αα xx xx + αα yy yy dd ww ii dd αα xx + αα yy dd
9 FEM Discretization of the 2-D BVP Equivalent Integral Form (Weak Form) Mathematical transformation of the first integral: II 11 = ww ii αα xx xx + αα yy yy dd The function under this integral can be transformed in the following form: ww ii αα xx xx + αα yy yy = = ww ii αα xx xx + αα yy yy ww ii αα xx xx + αα yy yy By introducing it into the integral I 11 the following form is obtained: II 11 = ww ii αα xx xx + αα yy yy dd + ww ii αα xx xx + αα yy yy dd
10 FEM Discretization of the 2-D BVP Equivalent Integral Form (Weak Form) The obtained form of the integral I 11 : II 11 = ww ii αα xx xx + αα yy yy dd + ww ii can be further transformed by using Grn s theorem: ww ii αα xx xx + αα yy yy dd = ww ii αα xx xx + αα yy yy αα xx xx + αα yy yy nn dddd dd Thus the Integral I 11 becomes: II 11 = ww ii αα xx xx + αα yy yy nn dddd + ww ii αα xx xx + αα yy yy dd
11 FEM Discretization of the 2-D BVP Equivalent Integral Form (Weak Form) In the last integral form (Slide 10) the boundary integrals can be merged: ww ii αα xx xx + αα yy yy dd NN + ww ii ββββ ff dd + ww ii qq dddd DD ww ii DD Ω ww ii ΦΦ pp dddd + αα xx xx + αα yy yy nn dddd = 0
12 FEM Discretization of the 2-D BVP Equivalent Integral Form (Weak Form) Over the Dirichlet boundaries the values of the unknown function is known and therefore the weighting functions can be there set to zero: ww ii xx, yy = 0, (xx, yy) DD Thus the equivalent integral form becomes: ww ii αα xx xx + αα yy yy dd + ww ii ββββ dd ww ii ff dd NN ww ii qq dddd = 0 This form is sometimes called the weak form of the BVP from Slide 5. The name weak comes from the fact that this form consists of only partial derivatives of first order, while the partial derivatives in the BVP are of second order ( strong form).
13 FEM Discretization of the Weak Form Domain Subdivision (Meshing) 2D computational domain: Domain subdivision (triangular mesh): Meshing Computational domain is of arbitrary shape (usually very complex geometry) Mesh consists of a large number of elements with simple geometry (triangles, quadrilaterals)
14 FEM Discretization of the Weak Form Domain Subdivision (Meshing) The original weak form: Subdivision: αα ww ii dd + ww ii ββββ dd ww ii ff dd = NN =1 The corresponding weak form after the subdivision: NN ww ii qq dddd = 0 NN =1 αα ww ii ΦΦ dd + NN =1 ww ii NN ββ ΦΦ dd =1 ww ii ff dd Ω NN where the superscript e refers to a local approximation within the element e. ww ii qq ddll = 0 Ω
15 FEM Discretization of the Weak Form Approximation of the Unknown Function Linear triangular element: Linear approximation of the unknown function over the element: ΦΦ xx, yy = aa + bbbb + cccc (1) The thr unknown coefficients of the approximation can be expressed with respect to the nodal values of the unknown function: The coordinates of the nodes are known (given by the mesh generator). ΦΦ 1 = aa + bbxx 1 + ccyy 1 ΦΦ 2 = aa + bbxx 2 + ccyy 2 ΦΦ 3 = aa + bbxx 3 + ccyy 3
16 FEM Discretization of the Weak Form Approximation of the Unknown Function Linear triangular element: It is useful to write the approximation equations in matrix form: ΦΦ xx, yy = aa + bbbb + cccc ΦΦ xx, yy = 1 xx yy aa bb cc (2) ΦΦ 1 = aa + bbxx 1 + ccyy 1 ΦΦ 2 = aa + bbxx 2 + ccyy 2 ΦΦ 3 = aa + bbxx 3 + ccyy 3 The coordinates of the nodes are known (given by the mesh generator). ΦΦ 1 ΦΦ 2 ΦΦ 3 = 1 xx 1 yy 1 1 xx 2 yy 2 1 xx 3 yy 3 aa bb cc = SS aa bb cc (3)
17 FEM Discretization of the Weak Form Approximation of the Unknown Function According to Equation (3) the coefficient of the function approximation are: aa bb cc = SS 1 ΦΦ 1 ΦΦ 2 ΦΦ 3 (4) The inversion of the matrix SS is not so difficult to find: SS 1 = 1 xx 1 yy 1 1 xx 2 yy 2 1 xx 3 yy 3 1 = 1 2AA xx 2 yy 3 xx 3 yy 2 xx 3 yy 1 xx 1 yy 3 xx 1 yy 2 xx 2 yy 1 yy 2 yy 3 yy 3 yy 1 yy 1 yy 2 xx 3 xx 2 xx 1 xx 3 xx 2 xx 1 where A is the surface area of the triangular element: AA = xx 2 xx 1 yy 3 yy 1 xx 3 xx 1 yy 2 yy 1
18 FEM Discretization of the Weak Form Approximation of the Unknown Function Finally, the approximation of the unknown function becomes: ΦΦ xx, yy = 1 aa 4 xx yy bb ΦΦ xx, yy = 1 xx yy SS 1 cc or even more detailed description: ΦΦ 1 ΦΦ 2 ΦΦ 3 (4) ΦΦ xx, yy = 1 xx yy 1 2AA xx 2 yy 3 xx 3 yy 2 xx 3 yy 1 xx 1 yy 3 xx 1 yy 2 xx 2 yy 1 yy 2 yy 3 yy 3 yy 1 yy 1 yy 2 xx 3 xx 2 xx 1 xx 3 xx 2 xx 1 ΦΦ 1 ΦΦ 2 ΦΦ 3 (5) The last equation is usually written in the following form: ΦΦ xx, yy = NN 1 (xx, yy) NN 2 (xx, yy) NN 3 (xx, yy) ΦΦ 1 ΦΦ 2 ΦΦ 3 3 = NN ii (xx, yy) ΦΦ ii ii=1 (6)
19 FEM Discretization of the Weak Form Approximation of the Unknown Function The final form of the approximation of the unknown function is thus obtained (Eq. (6)): 3 ΦΦ xx, yy = NN ii (xx, yy) ΦΦ ii ii=1 where NN ii (xx, yy) is the shape function of the node i of the element e. The shape function of a linear triangular element are also obtained (Equation (5)): NN 1 xx, yy = 1 2AA xx 2 yy 3 xx 3 yy 2 + yy 2 yy 3 xx + xx 3 xx 2 yy NN 2 xx, yy = 1 2AA xx 3 yy 1 xx 1 yy 3 + yy 3 yy 1 xx + xx 1 xx 3 yy NN 3 xx, yy = 1 2AA xx 1 yy 2 xx 2 yy 1 + yy 1 yy 2 xx + xx 2 xx 1 yy
20 FEM Discretization of the Weak Form Approximation of the Unknown Function The shape functions of a linear triangular element: A scalar shape function linearly increases its value over the triangle starting with zero along the edge opposite to its corresponding node and ending with 1 at the corresponding node. The most important properties of the shape functions are: NN ii xx jj, yy 0, ii jj jj = 1, ii = jj 3 NN ii (xx, yy) = 1, (xx, yy) Ω ii=1
21 FEM Discretization of the Weak Form Local Character of the Shape Functions ii The shape function of the node i lives on all the elements that contain this node: NN ii TT ii = xx, yy 0, (xx, yy) TT ii ii 0.2 Everywhere else is the shape function equal to zero: 0.0 NN ii xx, yy = 0, xx, yy TT ii
22 FEM Discretization of the Weak Form Local Character of the Shape Functions Due to the local character of the shape functions, it is rather simple to switch from the local (element based) notation to the global (computational domain) notation: 3 NN nn NN ii ΦΦ xx, yy = NN ii (xx, yy) ΦΦ LLoooooooo tttt GGGGGGGGGGGG NNNNNNNNNNNNNNNN ii ΦΦ xx, yy = (xx, yy) ΦΦ ii ii=1 ii=1
23 Numerical Example Mesh Topology Nodes (black) - coordinates: Node 1: xx 1, yy 1 = (0.70,0.10) Node 2: xx 2, yy 2 = (0.85,0.40) Node 3: xx 3, yy 3 = (0.73,0.67) Node 4: xx 4, yy 4 = (0.50,0.69) Node 5: xx 5, yy 5 = (0.30,0.35) Node 6: xx 6, yy 6 = (0.45,0.22) Node 7: xx 7, yy 7 = (0.60,0.43) Elements (red) - topology: Element 1: (nnnnnnnn 1, nnnnnnnn 2, nnnnnnnn 3 ) = (1,7,6) Element 2: (nnnnnnnn 1, nnnnnnnn 2, nnnnnnnn 3 ) = (1,2,7) Element 3: (nnnnnnnn 1, nnnnnnnn 2, nnnnnnnn 3 ) = (2,3,7) Element 4: (nnnnnnnn 1, nnnnnnnn 2, nnnnnnnn 3 ) = (3,4,7) Element 5: (nnnnnnnn 1, nnnnnnnn 2, nnnnnnnn 3 ) = (4,5,7) Element 6: (nnnnnnnn 1, nnnnnnnn 2, nnnnnnnn 3 ) = (5,6,7)
24 Numerical Example Approximation of a Scalar Function Assumption nodal field values are known: Node 1: ΦΦ xx 1, yy 1 = ΦΦ 1 = 1.2 Node 2: ΦΦ xx 2, yy 2 = ΦΦ 2 = 0.9 Node 3: ΦΦ xx 3, yy 3 = ΦΦ 3 = 0.8 Node 4: ΦΦ xx 4, yy 4 = ΦΦ 4 = 0.8 Node 5: ΦΦ xx 5, yy 5 = ΦΦ 5 = 1.5 Node 6: ΦΦ xx 6, yy 6 = ΦΦ 6 = 1.4 Node 7: ΦΦ xx 6, yy 6 = ΦΦ 7 = 1.5 The function ΦΦ is approximated over the elements of the mesh according to the following equation (global notation): NN nn NN ii ΦΦ xx, yy = ii=1 (xx, yy) ΦΦ ii
25 Numerical Example Isolines of the Approximated Function The function ΦΦ is approximated over the elements of the mesh according to the following equation (global notation): NN nn NN ii ΦΦ xx, yy = (xx, yy) ΦΦ ii ii=1 The visualized isolines reveal the linear character of our approximation.
26 FEM Sparse Linear System of Equations Weak Form Discretization The original weak form: Subdivision: αα ww ii dd + ww ii ββββ dd ww ii ff dd = NN =1 The corresponding weak form after the subdivision: NN ww ii qq dddd = 0 NN =1 αα ww ii ΦΦ dd + NN =1 ww ii NN ββ ΦΦ dd =1 ww ii ff dd Ω NN where the superscript e refers to a local approximation within the element e. ww ii qq ddll = 0 Ω
27 FEM Sparse Linear System of Equations Weak Form Discretization If we introduce the local approximation of the unknown function: 3 ΦΦ xx, yy = NN jj (xx, yy) ΦΦ jj jj=1 into the corresponding weak form obtained after the computational domain subdivision: NN =1 αα ww ii ΦΦ dd + NN =1 the following form is obtained: NN =1 NN =1 αα ww ii jj=1 3 ww ii ff dd ww ii NN jj (xx, yy) ΦΦ jj dd + Ω NN NN ββ ΦΦ dd NN =1 ww ii qq dddd = 0 Ω =1 3 ww ii ββ jj=1 ww ii ff dd Ω NN NN jj (xx, yy) ΦΦ jj dd ww ii qq ddll = 0 Ω
28 FEM Sparse Linear System of Equations Weak Form Discretization Concerning the obtained form: NN =1 NN =1 3 αα ww ii jj=1 ww ii ff dd NN jj (xx, yy) ΦΦ jj dd + Ω NN =1 ww ii qq dddd = 0 Ω 3 ww ii ββ jj=1 NN jj (xx, yy) ΦΦ jj dd it is beneficial to switch from the local to the global approximation of the unknown function, and to reverse the order of the nested sums: NN nn ΦΦ jj jj=1 NN =1 ssssssssssssss(nn jj ) NN nn αα ww ii jj dd + ΦΦ jj jj=1 ww ii ffdd ww ii qq dddd = 0 Ω Ω NN ssssssssssssss(nn jj ) ββ ww ii NN jj dd
29 FEM Sparse Linear System of Equations Selection of the Weighting Functions Up to now the weighting functions ww ii were not discussed. According to the well established mathematical foundations of FEM, for the selection of the weighting functions the so-called Galerkin method has a clear advantage in terms of accuracy over the other methods. Galerkin method suggests that the shape functions themselves play a role of the weighting functions: ww ii (xx, yy) = NN ii (xx, yy) Thus the weak form becomes: NN nn ΦΦ jj jj=1 ssssssssssssss(nn jj ) NN nn αα NN ii jj dd + ΦΦ jj jj=1 ssssssssssssss(nn jj ) ββ NN ii NN jj dd ssssssssssssss(nn ii ) NN ii ffdd NN ii qq dddd = 0 ssssssssssssss(nn ii ) Ω Ω NN
30 FEM Sparse Linear System of Equations Selection of the Weighting Functions The final equation of the weak form: NN nn ΦΦ jj jj=1 ssssssssssssss NN ii ssssssssssssss NN jj αα NN ii jj dd + NN nn + ΦΦ jj jj=1 ssssssssssssss(nn ii ) ssssssssssssss(nn jj ) ββ NN ii NN jj dd ssssssssssssss(nn ii ) NN ii ffdd NN ii qq dddd = 0 ssssssssssssss(nn ii ) Ω Ω NN can be written for each shape function NN ii, ii = 1,2,, NN nn. Thus, we have obtained a square system of NN nn linear equations with NN nn unknowns.
31 FEM Sparse Linear System of Equations Matrix Assembly According to the last equation the FEM linear system has the following form: where the matrix entries are: KK Φ = bb KK iiii = ssssssssssssss NN ii ssssssssssssss NN jj αα NN ii jj dd + ssssssssssssss NN ii ssssssssssssss NN jj ββ NN ii NN jj dd the right-hand side vector components are: bb ii = ssssssssssssss(nn ii ) NN ii ffdd + NN ii ssssssssssssss(nn ii ) Ω Ω NN and Φ is the unknown vector containing all the coefficients of the approximation of the unknown function. qq dddd
32 FEM Sparse Linear System of Equations Matrix Assembly (Elemental Contributions) According to the last equation the FEM linear system has the following form: KK Φ = bb where the matrix entries are: KK iiii = ssssssssssssss NN ii ssssssssssssss NN jj KK iiii the right-hand side vector components are: bb ii = ssssssssssssss(nn ii ) bb ii It is evident that each element contributes to the matrix and to the right-hand side.
33 FEM Sparse Linear System of Equations Matrix Assembly (Elemental Contributions) It is evident that each element contributes to the matrix and to the right-hand side: KK iiii = αα NN ii jj dd + ββ NN ii NN jj dd, ii, jj = 1,2,3 bb ii = NN ii ffdd + NN ii qq dddd, ii = 1,2,3 Ω
34 FEM Sparse Linear System of Equations Matrix Assembly (Elemental Contributions) It is evident that each element contributes to the matrix and to the right-hand side: [ ] e K { b e }
35 FEM Sparse Linear System of Equations Matrix Structure Typical sparse structure of the FEM matrix
36 FEM Sparse Linear System of Equations Solution Methods Direct solution of the FEM system of equations LU-decomposition Cholesky factorization Direct methods are impractical for large systems (above 10 6 unknowns) due to its high number of mathematical operations and round-off error. Iterative solution methods CG BiCG GMRES Iterative methods are very suitable for large systems but have a slow convergence when the FEM matrix is ill-conditioned (which is usually the case) Convergence acceleration could be achieved by using preconditioning methods: diagonal preconditioning, ILU (incomplete-lu), etc.
37 Numerical Examples (2-D Scalar FEM) Electrostatic Analysis and Capacitance Calculation V V ε r ε r = x x y y ρ ε 0 ε r = 1 ρ = 0 V = 0 n V = 0 V =1 ε r = 5
38 Numerical Examples (2-D Scalar FEM) Electrostatic Analysis and Capacitance Calculation Complete MATLAB Code for this example could be downloaded from the document repository. Triangular mesh Field plot N e =1399, N dof =1492 Equipotential lines Electric field vectors
39 Numerical Examples (2-D Scalar FEM) Analysis of Waveguide Discontinuities
40 Numerical Examples (2-D Scalar FEM) Analysis of Waveguide Discontinuities Theoretical description and Matlab-Code:
41 Summary (1) The fundamental idea of the finite element method can be observed in natural processes such as cracking of dried mud, for example. FEM does not discretize the original BVP (strong form) but the so called equivalent integral form (weak form). The weak form can be obtained from the general BVP by integrating its weighted residuals over the computational domain (the method of weighted residuals). Numerous practical simulation problems are special cases of the general BVP, i.e. of the general weak form presented (electrostatic, magnetostatic, thermal, etc. analyses). As an example, the general FEM-theory was applied to the problem of computing the leakage magnetic flux of a typical transformer winding configuration.
42 Summary (2) The FEM discretization process starts with domain discretization or subdivision. This subdivision is also called meshing and in this process topologically simple elements (triangles, quadrilaterals) are used. After the mesh of the computational domain is established, the integrals of the weak form are reduced to the corresponding finite sums. The unknown function is approximated over the elements of the mesh by using linear, quadratic, cubic, etc. shape functions. As a result of the approximation, the unknown function is represented as a sum of the known shape functions multiplied with the corresponding approximation coefficients. The unknown coefficients of this approximation are the nodal values of the unknown function. The shape functions are defined for each node of the mesh and have a local character. This means that a shape function has non-zero values only over those elements that contain its particular node.
43 Summary (3) For the selection of the weighting functions the so-called Galerkin method has a clear advantage in terms of accuracy over the other available methods (for example the point collocation or subdomain collocation). Galerkin method suggests that the shape functions themselves play a role of the weighting functions. Due to the local character of the shape functions the obtained linear equations system is sparse, i.e. the majority of its matrix entries are equal to zero. There are several modern direct (LU-decomposition, Cholesky-factorization, etc.) and iterative (CG, BiCG, GMRES, etc.) for solving of large FEM linear systems. The iterative solution methods have an advantage in terms of their complexity and accuracy over the direct methods but they usually have slow convergence since the FEM matrices are almost exclusively ill-conditioned. The convergence rate of the iterative methods could be accelerated by applying an appropriate preconditioner (diagonal preconditioner, incomplete-lu, etc.)
44 Literature Wolfram MathWorld, the web s most extensive mathematics resource, J. D. Jackson, Classical Electrodynamics, Third Edition, John Wiley & Sons, New York, N. Ida, Enginring Electromagnetics, Second Edition, Springer-Verlag, New York, J. Jin, The Finite Element Method in Electromagnetics, Second Edition, John Wiley & Sons, New York, 2002.
Special Topics: Data Science
Special Topics: Data Science L Linear Methods for Prediction Dr. Vidhyasaharan Sethu School of Electrical Engineering & Telecommunications University of New South Wales Sydney, Australia V. Sethu 1 Topics
More informationLecture 5. Optimisation. Regularisation
Lecture 5. Optimisation. Regularisation COMP90051 Statistical Machine Learning Semester 2, 2017 Lecturer: Andrey Kan Copyright: University of Melbourne Iterative optimisation Loss functions Coordinate
More informationECO 745: Theory of International Economics. Jack Rossbach Fall Lecture 6
ECO 745: Theory of International Economics Jack Rossbach Fall 2015 - Lecture 6 Review We ve covered several models of trade, but the empirics have been mixed Difficulties identifying goods with a technological
More informationMixture Models & EM. Nicholas Ruozzi University of Texas at Dallas. based on the slides of Vibhav Gogate
Mixture Models & EM Nicholas Ruozzi University of Texas at Dallas based on the slides of Vibhav Gogate Previously We looked at -means and hierarchical clustering as mechanisms for unsupervised learning
More informationLecture 10. Support Vector Machines (cont.)
Lecture 10. Support Vector Machines (cont.) COMP90051 Statistical Machine Learning Semester 2, 2017 Lecturer: Andrey Kan Copyright: University of Melbourne This lecture Soft margin SVM Intuition and problem
More informationWhat is Restrained and Unrestrained Pipes and what is the Strength Criteria
What is Restrained and Unrestrained Pipes and what is the Strength Criteria Alex Matveev, September 11, 2018 About author: Alex Matveev is one of the authors of pipe stress analysis codes GOST 32388-2013
More informationPre-Kindergarten 2017 Summer Packet. Robert F Woodall Elementary
Pre-Kindergarten 2017 Summer Packet Robert F Woodall Elementary In the fall, on your child s testing day, please bring this packet back for a special reward that will be awarded to your child for completion
More informationCombining Experimental and Non-Experimental Design in Causal Inference
Combining Experimental and Non-Experimental Design in Causal Inference Kari Lock Morgan Department of Statistics Penn State University Rao Prize Conference May 12 th, 2017 A Tribute to Don Design trumps
More informationSupport Vector Machines: Optimization of Decision Making. Christopher Katinas March 10, 2016
Support Vector Machines: Optimization of Decision Making Christopher Katinas March 10, 2016 Overview Background of Support Vector Machines Segregation Functions/Problem Statement Methodology Training/Testing
More informationCT4510: Computer Graphics. Transformation BOCHANG MOON
CT4510: Computer Graphics Transformation BOCHANG MOON 2D Translation Transformations such as rotation and scale can be represented using a matrix M ee. gg., MM = SSSS xx = mm 11 xx + mm 12 yy yy = mm 21
More informationTie Breaking Procedure
Ohio Youth Basketball Tie Breaking Procedure The higher seeded team when two teams have the same record after completion of pool play will be determined by the winner of their head to head competition.
More informationSNARKs with Preprocessing. Eran Tromer
SNARKs with Preprocessing Eran Tromer BIU Winter School on Verifiable Computation and Special Encryption 4-7 Jan 206 G: Someone generates and publishes a common reference string P: Prover picks NP statement
More informationSimplifying Radical Expressions and the Distance Formula
1 RD. Simplifying Radical Expressions and the Distance Formula In the previous section, we simplified some radical expressions by replacing radical signs with rational exponents, applying the rules of
More informationBayesian Methods: Naïve Bayes
Bayesian Methods: Naïve Bayes Nicholas Ruozzi University of Texas at Dallas based on the slides of Vibhav Gogate Last Time Parameter learning Learning the parameter of a simple coin flipping model Prior
More informationCS249: ADVANCED DATA MINING
CS249: ADVANCED DATA MINING Linear Regression, Logistic Regression, and GLMs Instructor: Yizhou Sun yzsun@cs.ucla.edu April 24, 2017 About WWW2017 Conference 2 Turing Award Winner Sir Tim Berners-Lee 3
More informationConservation of Energy. Chapter 7 of Essential University Physics, Richard Wolfson, 3 rd Edition
Conservation of Energy Chapter 7 of Essential University Physics, Richard Wolfson, 3 rd Edition 1 Different Types of Force, regarding the Work they do. gravity friction 2 Conservative Forces BB WW cccccccc
More informationImperfectly Shared Randomness in Communication
Imperfectly Shared Randomness in Communication Madhu Sudan Harvard Joint work with Clément Canonne (Columbia), Venkatesan Guruswami (CMU) and Raghu Meka (UCLA). 11/16/2016 UofT: ISR in Communication 1
More informationCS145: INTRODUCTION TO DATA MINING
CS145: INTRODUCTION TO DATA MINING 3: Vector Data: Logistic Regression Instructor: Yizhou Sun yzsun@cs.ucla.edu October 9, 2017 Methods to Learn Vector Data Set Data Sequence Data Text Data Classification
More informationOperations on Radical Expressions; Rationalization of Denominators
0 RD. 1 2 2 2 2 2 2 2 Operations on Radical Expressions; Rationalization of Denominators Unlike operations on fractions or decimals, sums and differences of many radicals cannot be simplified. For instance,
More informationJamming phenomena of self-driven particles
Jamming phenomena of self-driven particles Pedestrian Outflow and Obstacle Walking with Slow Rhythm Daichi Yanagisawa, RCAST, UTokyo Pedestrian Outflow and Obstacle Phys. Rev. E, 76(6), 061117, 2007 Phys.
More informationOperational Risk Management: Preventive vs. Corrective Control
Operational Risk Management: Preventive vs. Corrective Control Yuqian Xu (UIUC) July 2018 Joint Work with Lingjiong Zhu and Michael Pinedo 1 Research Questions How to manage operational risk? How does
More informationDecision Trees. Nicholas Ruozzi University of Texas at Dallas. Based on the slides of Vibhav Gogate and David Sontag
Decision Trees Nicholas Ruozzi University of Texas at Dallas Based on the slides of Vibhav Gogate and David Sontag Announcements Course TA: Hao Xiong Office hours: Friday 2pm-4pm in ECSS2.104A1 First homework
More informationTSP at isolated intersections: Some advances under simulation environment
TSP at isolated intersections: Some advances under simulation environment Zhengyao Yu Vikash V. Gayah Eleni Christofa TESC 2018 December 5, 2018 Overview Motivation Problem introduction Assumptions Formation
More informationISyE 6414 Regression Analysis
ISyE 6414 Regression Analysis Lecture 2: More Simple linear Regression: R-squared (coefficient of variation/determination) Correlation analysis: Pearson s correlation Spearman s rank correlation Variable
More informationThe Simple Linear Regression Model ECONOMETRICS (ECON 360) BEN VAN KAMMEN, PHD
The Simple Linear Regression Model ECONOMETRICS (ECON 360) BEN VAN KAMMEN, PHD Outline Definition. Deriving the Estimates. Properties of the Estimates. Units of Measurement and Functional Form. Expected
More informationAbstract In this paper, the author deals with the properties of circumscribed ellipses of convex quadrilaterals, using tools of parallel projective tr
Study on the Properties of Circumscribed Ellipses of Convex Quadrilaterals Author: Yixi Shen Mentors: Zhongyuan Dai; Yijun Yao No. High School of East China Normal University Shanghai, China December,
More informationProduct Decomposition in Supply Chain Planning
Mario R. Eden, Marianthi Ierapetritou and Gavin P. Towler (Editors) Proceedings of the 13 th International Symposium on Process Systems Engineering PSE 2018 July 1-5, 2018, San Diego, California, USA 2018
More informationChapter 10 Aggregate Demand I: Building the IS LM Model
Chapter 10 Aggregate Demand I: Building the IS LM Model Zhengyu Cai Ph.D. Institute of Development Southwestern University of Finance and Economics All rights reserved http://www.escience.cn/people/zhengyucai/index.html
More informationA COURSE OUTLINE (September 2001)
189-265A COURSE OUTLINE (September 2001) 1 Topic I. Line integrals: 2 1 2 weeks 1.1 Parametric curves Review of parametrization for lines and circles. Paths and curves. Differentiation and integration
More informationPhysical Design of CMOS Integrated Circuits
Physical Design of CMOS Integrated Circuits Dae Hyun Kim EECS Washington State University References John P. Uyemura, Introduction to VLSI Circuits and Systems, 2002. Chapter 5 Goal Understand how to physically
More informationMassey Method. Introduction. The Process
Massey Method Introduction Massey s Method, also referred to as the Point Spread Method, is a rating method created by mathematics professor Kenneth Massey. It is currently used to determine which teams
More informationAddition and Subtraction of Rational Expressions
RT.3 Addition and Subtraction of Rational Expressions Many real-world applications involve adding or subtracting algebraic fractions. Similarly as in the case of common fractions, to add or subtract algebraic
More informationLesson 14: Modeling Relationships with a Line
Exploratory Activity: Line of Best Fit Revisited 1. Use the link http://illuminations.nctm.org/activity.aspx?id=4186 to explore how the line of best fit changes depending on your data set. A. Enter any
More informationCourse 495: Advanced Statistical Machine Learning/Pattern Recognition
Course 495: Advanced Statistical Machine Learning/Pattern Recognition Lectures: Stefanos Zafeiriou Goal (Lectures): To present modern statistical machine learning/pattern recognition algorithms. The course
More informationReport for Experiment #11 Testing Newton s Second Law On the Moon
Report for Experiment #11 Testing Newton s Second Law On the Moon Neil Armstrong Lab partner: Buzz Aldrin TA: Michael Collins July 20th, 1969 Abstract In this experiment, we tested Newton s second law
More informationknn & Naïve Bayes Hongning Wang
knn & Naïve Bayes Hongning Wang CS@UVa Today s lecture Instance-based classifiers k nearest neighbors Non-parametric learning algorithm Model-based classifiers Naïve Bayes classifier A generative model
More informationNew Numerical Schemes for the Solution of Slightly Stiff Second Order Ordinary Differential Equations
American Journal of Computational and Applied Mathematics 24, 4(6): 239-246 DOI:.5923/j.ajcam.2446.7 New Numerical Schemes for the Solution of Slightly Stiff Second Order Ordinary Differential Equations
More informationAttacking and defending neural networks. HU Xiaolin ( 胡晓林 ) Department of Computer Science and Technology Tsinghua University, Beijing, China
Attacking and defending neural networks HU Xiaolin ( 胡晓林 ) Department of Computer Science and Technology Tsinghua University, Beijing, China Outline Background Attacking methods Defending methods 2 AI
More informationLesson 23: The Volume of a Right Prism
Lesson 23 Lesson 23: Student Outcomes Students use the known formula for the volume of a right rectangular prism (length width height). Students understand the volume of a right prism to be the area of
More informationCoaches, Parents, Players and Fans
P.O. Box 865 * Lancaster, OH 43130 * 740-808-0380 * www.ohioyouthbasketball.com Coaches, Parents, Players and Fans Sunday s Championship Tournament in Boys Grades 5th thru 10/11th will be conducted in
More informationDNS Study on Three Vortex Identification Methods
Γ DNS Study on Three Vortex Identification Methods Yinlin Dong Yong Yang Chaoqun Liu Technical Report 2016-07 http://www.uta.edu/math/preprint/ DNS Study on Three Vortex Identification Methods Yinlin Dong
More informationgraphic standards manual Mountain States Health Alliance
manual Mountain States mountain states health alliance Bringing Loving Care to Health Care Table of Contents 4 5 6 7 9 -- Why do we need? Brandmark Specifications Brandmark Color Palette Corporate Typography
More informationWindcube FCR measurements
Windcube FCR measurements Principles, performance and recommendations for use of the Flow Complexity Recognition (FCR) algorithm for the Windcube ground-based Lidar Summary: As with any remote sensor,
More informationUse of Auxiliary Variables and Asymptotically Optimum Estimators in Double Sampling
International Journal of Statistics and Probability; Vol. 5, No. 3; May 2016 ISSN 1927-7032 E-ISSN 1927-7040 Published by Canadian Center of Science and Education Use of Auxiliary Variables and Asymptotically
More informationLogistic Regression. Hongning Wang
Logistic Regression Hongning Wang CS@UVa Today s lecture Logistic regression model A discriminative classification model Two different perspectives to derive the model Parameter estimation CS@UVa CS 6501:
More informationCommunication Amid Uncertainty
Communication Amid Uncertainty Madhu Sudan Harvard University Based on joint works with Brendan Juba, Oded Goldreich, Adam Kalai, Sanjeev Khanna, Elad Haramaty, Jacob Leshno, Clement Canonne, Venkatesan
More informationNew Class of Almost Unbiased Modified Ratio Cum Product Estimators with Knownparameters of Auxiliary Variables
Journal of Mathematics and System Science 7 (017) 48-60 doi: 10.1765/159-591/017.09.00 D DAVID PUBLISHING New Class of Almost Unbiased Modified Ratio Cum Product Estimators with Knownparameters of Auxiliary
More informationCFD Analysis of Giromill Type Vertical Axis Wind Turbine
242 CFD Analysis Giromill Type Vertical Axis Wind Turbine K. Sainath 1, T. Ravi 2, Suresh Akella 3, P. Madhu Sudhan 4 1 Associate Pressor, Department Mechanical Engineering, Sreyas Inst. Engg. & Tech.,
More informationCleveland State University MCE441: Intr. Linear Control Systems. Lecture 6: The Transfer Function Poles and Zeros Partial Fraction Expansions
Cleveland State University MCE441: Intr. Linear Control Systems Lecture 6: The and Zeros Partial Fraction Expansions Prof. Richter 1 / 12 System and Zeros and Zeros in Decomposition- Obtaining the - in
More informationBézier Curves and Splines
CS-C3100 Computer Graphics Bézier Curves and Splines Majority of slides from Frédo Durand vectorportal.com CS-C3100 Fall 2016 Lehtinen Before We Begin Anything on your mind concerning Assignment 1? Linux
More information*MAT GAS MIXTURE, a new gas mixture model for airbag applications
4 th European LS-DYNA Users Conference Occupant III / Airbag *MAT GAS MIXTURE, a new gas mixture model for airbag applications Author: Lars Olovsson LSTC Correspondence: tel/fax: +46-852 030 881 e-mail:
More informationCOMP Intro to Logic for Computer Scientists. Lecture 13
COMP 1002 Intro to Logic for Computer Scientists Lecture 13 B 5 2 J Admin stuff Assignments schedule? Split a2 and a3 in two (A2,3,4,5), 5% each. A2 due Feb 17 th. Midterm date? March 2 nd. No office hour
More informationA Mechanics-Based Approach for Putt Distance Optimization
University of Central Florida HIM 1990-2015 Open Access A Mechanics-Based Approach for Putt Distance Optimization 2015 Pascual Santiago-Martinez University of Central Florida Find similar works at: http://stars.library.ucf.edu/honorstheses1990-2015
More informationInvestigating the Problems of Ship Propulsion on a Supercomputer
Ship Elbrus powered by What I See is What I Understand. Так мы его задумали Investigating the Problems of Ship Propulsion on a Supercomputer A.A. Aksenov, S.V. Zhluktov, D.P. Silaev, S.A. Kharchenko, E.A.
More informationCommunication Amid Uncertainty
Communication Amid Uncertainty Madhu Sudan Harvard University Based on joint works with Brendan Juba, Oded Goldreich, Adam Kalai, Sanjeev Khanna, Elad Haramaty, Jacob Leshno, Clement Canonne, Venkatesan
More informationA Class of Regression Estimator with Cum-Dual Ratio Estimator as Intercept
International Journal of Probability and Statistics 015, 4(): 4-50 DOI: 10.593/j.ijps.015040.0 A Class of Regression Estimator with Cum-Dual Ratio Estimator as Intercept F. B. Adebola 1, N. A. Adegoke
More informationEffectofStepDepthandAngleinKlineFoglemanKfm2Airfoil
Global Journal of Researches in Engineering: J General Engineering Volume 16 Issue 4 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online
More informationEE582 Physical Design Automation of VLSI Circuits and Systems
EE Prof. Dae Hyun Kim School of Electrical Engineering and Computer Science Washington State University Routing Grid Routing Grid Routing Grid Routing Grid Routing Grid Routing Lee s algorithm (Maze routing)
More informationDetermination of the wind pressure distribution on the facade of the triangularly shaped high-rise building structure
Determination of the wind pressure distribution on the facade of the triangularly shaped high-rise building structure Norbert Jendzelovsky 1,*, Roland Antal 1 and Lenka Konecna 1 1 STU in Bratislava, Faculty
More informationNUMERICAL SIMULATION OF STATIC INTERFERENCE EFFECTS FOR SINGLE BUILDINGS GROUP
NUMERICAL SIMULATION OF STATIC INTERFERENCE EFFECTS FOR SINGLE BUILDINGS GROUP Xing-qian Peng, Chun-hui Zhang 2 and Chang-gui Qiao 2 Professor, College of Civil Engineering, Huaqiao University, Quanzhou,
More informationIntroduction to Genetics
Name: Introduction to Genetics Keystone Assessment Anchor: BIO.B.2.1.1: Describe and/or predict observed patterns of inheritance (i.e. dominant, recessive, co-dominance, incomplete dominance, sex-linked,
More informationFinite Element Analysis of an Aluminium Bike Frame
Finite Element Analysis of an Aluminium Bike Frame Word Count: 1484 1 1. Introduction Each new bike model must pass a series of structural tests before being released for public retail. The purpose of
More informationMODELLING OF WATER FLOW ON SMALL VESSEL S DECK
Monika Warmowska, Jan Jankowski, Polski Rejestr Statków S.A., al. gen. Józefa Hallera 126, Poland, Gdańsk, 80-416 MODELLING OF WATER FLOW ON SMALL VESSEL S DECK Summary Green water moving on deck of small
More informationCS 4649/7649 Robot Intelligence: Planning
CS 4649/7649 Robot Intelligence: Planning Differential Kinematics, Probabilistic Roadmaps Sungmoon Joo School of Interactive Computing College of Computing Georgia Institute of Technology S. Joo (sungmoon.joo@cc.gatech.edu)
More informationMotion Representation of Walking/Slipping/Turnover for Humanoid Robot by Newton-Euler Method
SICE Annual Conference 211 September 13-18, 211, Waseda University, Tokyo, Japan Motion Representation of Walking//Turnover for Humanoid Robot by Newton-Euler Method Tomohide Maeba 1, Geng Wang 1, Fujia
More informationIncompressible Potential Flow. Panel Methods (3)
Incompressible Potential Flow Panel Methods (3) Outline Some Potential Theory Derivation of the Integral Equation for the Potential Classic Panel Method Program PANEL Subsonic Airfoil Aerodynamics Issues
More informationNATIONAL FEDERATION RULES B. National Federation Rules Apply with the following TOP GUN EXCEPTIONS
TOP GUN COACH PITCH RULES 8 & Girls Division Revised January 11, 2018 AGE CUT OFF A. Age 8 & under. Cut off date is January 1st. Player may not turn 9 before January 1 st. Please have Birth Certificates
More informationINTRODUCTION Microfilm copy of the Draper Collection of manuscripts. Originals located at the State Historical Society of Wisconsin.
C Draper, Lyman Copeland, Collection, 1735-1815 2964 136 rolls of microfilm RESTRICTED MICROFILM This collection is available at The State Historical Society of Missouri. If you would like more information,
More informationOPTIMAL TRAJECTORY GENERATION OF COMPASS-GAIT BIPED BASED ON PASSIVE DYNAMIC WALKING
OPTIMAL TRAJECTORY GENERATION OF COMPASS-GAIT BIPED BASED ON PASSIVE DYNAMIC WALKING Minseung Kim Dept. of Computer Science Illinois Institute of Technology 3201 S. State St. Box 2082 Chicago IL 60616
More informationTransactions on Ecology and the Environment vol 12, 1996 WIT Press, ISSN
Open boundary condition for unsteady open-channel flow K. Mizumura Civil Engineering Department, Kanazawa Institute of Technology, 7-1 Ogigaoka, Nonoichimachi, Ishikawa Pref. 921, Japan Abstract Initial
More informationWorkshop 1: Bubbly Flow in a Rectangular Bubble Column. Multiphase Flow Modeling In ANSYS CFX Release ANSYS, Inc. WS1-1 Release 14.
Workshop 1: Bubbly Flow in a Rectangular Bubble Column 14. 5 Release Multiphase Flow Modeling In ANSYS CFX 2013 ANSYS, Inc. WS1-1 Release 14.5 Introduction This workshop models the dispersion of air bubbles
More informationINSTRUMENT INSTRUMENTAL ERROR (of full scale) INSTRUMENTAL RESOLUTION. Tutorial simulation. Tutorial simulation
Lab 1 Standing Waves on a String Learning Goals: To distinguish between traveling and standing waves To recognize how the wavelength of a standing wave is measured To recognize the necessary conditions
More informationMidterm Exam 1, section 2. Thursday, September hour, 15 minutes
San Francisco State University Michael Bar ECON 312 Fall 2018 Midterm Exam 1, section 2 Thursday, September 27 1 hour, 15 minutes Name: Instructions 1. This is closed book, closed notes exam. 2. You can
More informationPore-Air Entrapment during Infiltration
Pore-Air Entrapment during Infiltration GEO-SLOPE International Ltd. www.geo-slope.com 1200, 700-6th Ave SW, Calgary, AB, Canada T2P 0T8 Main: +1 403 269 2002 Fax: +1 888 463 2239 Introduction Infiltration
More informationA HYBRID METHOD FOR CALIBRATION OF UNKNOWN PARTIALLY/FULLY CLOSED VALVES IN WATER DISTRIBUTION SYSTEMS ABSTRACT
A HYBRID METHOD FOR CALIBRATION OF UNKNOWN PARTIALLY/FULLY CLOSED VALVES IN WATER DISTRIBUTION SYSTEMS Nhu Cuong Do 1,2, Angus Simpson 3, Jochen Deuerlein 4, Olivier Piller 5 1 University of Saskatchewan,
More informationMinimum Mean-Square Error (MMSE) and Linear MMSE (LMMSE) Estimation
Minimum Mean-Square Error (MMSE) and Linear MMSE (LMMSE) Estimation Outline: MMSE estimation, Linear MMSE (LMMSE) estimation, Geometric formulation of LMMSE estimation and orthogonality principle. Reading:
More informationIn memory of Dr. Kevin P. Granata, my graduate advisor, who was killed protecting others on the morning of April 16, 2007.
Acknowledgement In memory of Dr. Kevin P. Granata, my graduate advisor, who was killed protecting others on the morning of April 16, 2007. There are many others without whom I could not have completed
More informationFull Name: Period: Heredity EOC Review
Full Name: Period: 1 4 5 6 7 Heredity EOC Review Directions: For each genotype below, indicate whether it is a heterozygous (write: He) OR homozygous (write: Ho). 1. Tt BB DD ff tt dd dd Ff TT Bb bb FF
More informationChapter 2 Ventilation Network Analysis
Chapter 2 Ventilation Network Analysis Abstract Ventilation network analysis deals with complex working procedures to calculate the air currents flowing in the various meshes or branches of a mine network.
More informationLesson 18: There Is Only One Line Passing Through a Given Point with a Given Slope
There Is Only One Line Passing Through a Given Point with a Given Slope Classwork Opening Exercise Examine each of the graphs and their equations. Identify the coordinates of the point where the line intersects
More informationDevelopment of Fluid-Structure Interaction Program for the Mercury Target
Chapter 4 Epoch Making Simulation Development of Fluid-Structure Interaction Program for the Mercury Target Project Representative Chuichi Arakawa Authors Chuichi Arakawa Takuma Kano Ryuta Imai Japan Atomic
More informationCompensator Design for Speed Control of DC Motor by Root Locus Approach using MATLAB
Compensator Design for Speed Control of DC Motor by Root Locus Approach using MATLAB Akshay C. Mahakalkar, Gaurav R. Powale 2, Yogita R. Ashtekar 3, Dinesh L. Mute 4, 2 B.E. 4 th Year Student of Electrical
More informationAnalysis of Shear Lag in Steel Angle Connectors
University of New Hampshire University of New Hampshire Scholars' Repository Honors Theses and Capstones Student Scholarship Spring 2013 Analysis of Shear Lag in Steel Angle Connectors Benjamin Sawyer
More informationGrade K-1 WRITING Traffic Safety Cross-Curriculum Activity Workbook
Grade K-1 WRITING Tra fic Safety Cross-Curriculum Activity Workbook Note to Teachers The AAA Traffic Safety Education Materials present essential safety concepts to students in Kindergarten through fifth
More informationAre Advanced Wind Flow Models More Accurate? A Test of Four Models
Are Advanced Wind Flow Models More Accurate? A Test of Four Models Philippe Beaucage, PhD Senior Research Scientist Michael C. Brower, PhD Chief Technical Officer Brazil Wind Power Conference 2012 Albany
More informationEE 364B: Wind Farm Layout Optimization via Sequential Convex Programming
EE 364B: Wind Farm Layout Optimization via Sequential Convex Programming Jinkyoo Park 1 Introduction In a wind farm, the wakes formed by upstream wind turbines decrease the power outputs of downstream
More informationSpecial Right Triangles
GEOMETRY Special Right Triangles OBJECTIVE #: G.SRT.C.8 OBJECTIVE Use trigonometric ratios and the Pythagorean Theorem to solve right triangles in applied problems. *(Modeling Standard) BIG IDEA (Why is
More informationAnalysis of Gini s Mean Difference for Randomized Block Design
American Journal of Mathematics and Statistics 2015, 5(3): 111-122 DOI: 10.5923/j.ajms.20150503.02 Analysis of Gini s Mean Difference for Randomized Block Design Elsayed A. H. Elamir Department of Statistics
More informationOptimal Weather Routing Using Ensemble Weather Forecasts
Optimal Weather Routing Using Ensemble Weather Forecasts Asher Treby Department of Engineering Science University of Auckland New Zealand Abstract In the United States and the United Kingdom it is commonplace
More informationA finite-element sea-breeze model
Retrospective Theses and Dissertations 1981 A finite-element sea-breeze model Lang-Ping Chang Iowa State University Follow this and additional works at: http://lib.dr.iastate.edu/rtd Part of the Atmospheric
More informationIncompressible Flow over Airfoils
Road map for Chap. 4 Incompressible Flow over Airfoils Aerodynamics 2015 fall - 1 - < 4.1 Introduction > Incompressible Flow over Airfoils Incompressible flow over airfoils Prandtl (20C 초 ) Airfoil (2D)
More informationHermetic Compressor Manifold Analysis With the Use of the Finite Element Method
Purdue University Purdue e-pubs International Compressor Engineering Conference School of Mechanical Engineering 2008 Hermetic Compressor Manifold Analysis With the Use of the Finite Element Method Rinaldo
More informationFunctions of Random Variables & Expectation, Mean and Variance
Functions of Random Variables & Expectation, Mean and Variance Kuan-Yu Chen ( 陳冠宇 ) @ TR-409, NTUST Functions of Random Variables 1 Given a random variables XX, one may generate other random variables
More informationCalibration and validation of an air quality finite element model around an electric power plant in Gran Canaria island
Calibration and validation of an air quality finite element model around an electric power plant in Gran Canaria island J. Ramírez (1), A. Oliver (2), J.E. González (3), R. Montenegro (1) (1) Instituto
More informationEE241 - Spring 2013 Advanced Digital Integrated Circuits. Assigned reading. No new reading. Lecture 4: Transistor Models
EE41 - Spring 013 Advanced Digital Integrated ircuits ecture 4: Transistor Models Assigned reading No new reading 1 Outline ast lecture Features of modern technologies This lecture Transistor modeling
More information6.28 PREDICTION OF FOG EPISODES AT THE AIRPORT OF MADRID- BARAJAS USING DIFFERENT MODELING APPROACHES
6.28 PREDICTION OF FOG EPISODES AT THE AIRPORT OF MADRID- BARAJAS USING DIFFERENT MODELING APPROACHES Cecilia Soriano 1, Darío Cano 2, Enric Terradellas 3 and Bill Physick 4 1 Universitat Politècnica de
More informationComputational Analysis of Cavity Effect over Aircraft Wing
World Engineering & Applied Sciences Journal 8 (): 104-110, 017 ISSN 079-04 IDOSI Publications, 017 DOI: 10.589/idosi.weasj.017.104.110 Computational Analysis of Cavity Effect over Aircraft Wing 1 P. Booma
More informationAn Innovative Solution for Water Bottling Using PET
An Innovative Solution for Water Bottling Using PET A. Castellano, P. Foti, A. Fraddosio, S. Marzano, M.D. Piccioni, D. Scardigno* DICAR Politecnico di Bari, Italy *Via Orabona 4, 70125 Bari, Italy, scardigno@imedado.poliba.it
More informationFinal. Mark Scheme. Linear Mathematics. (Specification 4365) Paper 2 Foundation Tier 43652F. General Certificate of Secondary Education June 2013
Version 1.0 General Certificate of Secondary Education June 2013 Linear Mathematics 4365 (Specification 4365) Paper 2 Foundation Tier 43652F Final Mark Scheme Mark schemes are prepared by the Principal
More informationMachine Learning Application in Aviation Safety
Machine Learning Application in Aviation Safety Surface Safety Metric MOR Classification Presented to: By: Date: ART Firdu Bati, PhD, FAA September, 2018 Agenda Surface Safety Metric (SSM) development
More information