2018
DOI: 10.2478/amns.2018.2.00038
|View full text |Cite
|
Sign up to set email alerts
|

Review of numerical methods for NumILPT with computational accuracy assessment for fractional calculus

Abstract: In the paper we present results of accuracy evaluation of numerous numerical algorithms for the numerical approximation of the Inverse Laplace Transform. The selected algorithms represent diverse lines of approach to this problem and include methods by Stehfest, Abate and Whitt, Vlach and Singhai, De Hoog, Talbot, Zakian and a one in which the FFT is applied for the Fourier series convergence acceleration. We use C++ and Python languages with arbitrary precision mathematical libraries to address some crucial i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 64 publications
(22 citation statements)
references
References 34 publications
0
22
0
Order By: Relevance
“…2, we obtain an error of around 3% (2.7% in box U, 2.8% in box I, and 3.5% in box O). It is possible that replacingderivatives by fractional derivatives would improve the predictions, see [19].…”
Section: Indoor Simulation and Experimental Resultsmentioning
confidence: 99%
“…2, we obtain an error of around 3% (2.7% in box U, 2.8% in box I, and 3.5% in box O). It is possible that replacingderivatives by fractional derivatives would improve the predictions, see [19].…”
Section: Indoor Simulation and Experimental Resultsmentioning
confidence: 99%
“…In the process of establishing and updating the route based on geographical location, the nodes were strictly limited to obtain the geographic location information of nodes that were not related to them, but the wiretap nodes were unable to use the channel state of the overall route for information restoration so that the safety of information transmission could be ensured. The route information stored from node A to node G was reduced in turn, and the information that the back-end node had nothing to do with the current node that was reduced, so that it was able to interfere with the illegal data during the information transmission and improve the transmission security of information at the physical layer [16][17][18].…”
Section: Architecture Designmentioning
confidence: 99%
“…wiretap nodes were unable to use the channel state of the overall route for information restoration so that the safety of information transmission could be ensured. The route information stored from node A to node G was reduced in turn, and the information that the back-end node had nothing to do with the current node that was reduced, so that it was able to interfere with the illegal data during the information transmission and improve the transmission security of information at the physical layer [16][17][18]. The information transmission process in VANET was divided into three stages: sending, relay routing, and receiving.…”
Section: Architecture Designmentioning
confidence: 99%
“…That is to say, depth image is the image information that reflects the target distance detected by the sensor as the reference distance in the detection environment. So the depth image can also be understood as the distance image between the target and the sensor [7][8][9]. It is a practical method proposed by many scholars in China and abroad to map the depth image of the same scene into the RGB image space.…”
Section: Depth Imaging Processmentioning
confidence: 99%