001 | 910301 | ||
005 | 20221021130358.0 | ||
024 | 7 | _ | |a 10.1007/978-3-031-07171-3_10 |2 doi |
024 | 7 | _ | |a 2128/32080 |2 Handle |
037 | _ | _ | |a FZJ-2022-03736 |
041 | _ | _ | |a English |
100 | 1 | _ | |a Kleefeld, Andreas |0 P:(DE-Juel1)169421 |b 0 |e Corresponding author |u fzj |
245 | _ | _ | |a Computing Elastic Interior Transmission Eigenvalues |
260 | _ | _ | |a Cham |c 2022 |b Springer International Publishing |
295 | 1 | 0 | |a Integral Methods in Science and Engineering |
300 | _ | _ | |a 139-155 |
336 | 7 | _ | |a BOOK_CHAPTER |2 ORCID |
336 | 7 | _ | |a Book Section |0 7 |2 EndNote |
336 | 7 | _ | |a bookPart |2 DRIVER |
336 | 7 | _ | |a INBOOK |2 BibTeX |
336 | 7 | _ | |a Output Types/Book chapter |2 DataCite |
336 | 7 | _ | |a Contribution to a book |b contb |m contb |0 PUB:(DE-HGF)7 |s 1666271023_15493 |2 PUB:(DE-HGF) |
520 | _ | _ | |a An alternative method is presented to numerically compute interior elastic transmission eigenvalues for various domains in two dimensions. This is achieved by discretizing the resulting system of boundary integral equations in combination with a non-linear eigenvalue solver. Numerical results are given to show that this new approach can provide better results than the finite element method when dealing with general domains. |
536 | _ | _ | |a 5112 - Cross-Domain Algorithms, Tools, Methods Labs (ATMLs) and Research Groups (POF4-511) |0 G:(DE-HGF)POF4-5112 |c POF4-511 |f POF IV |x 0 |
588 | _ | _ | |a Dataset connected to CrossRef Book |
700 | 1 | _ | |a Zimmermann, M. |0 P:(DE-HGF)0 |b 1 |
773 | _ | _ | |a 10.1007/978-3-031-07171-3_10 |
856 | 4 | _ | |u https://juser.fz-juelich.de/record/910301/files/kleefeld.pdf |y OpenAccess |
909 | C | O | |o oai:juser.fz-juelich.de:910301 |p openaire |p open_access |p VDB |p driver |p dnbdelivery |
910 | 1 | _ | |a Forschungszentrum Jülich |0 I:(DE-588b)5008462-8 |k FZJ |b 0 |6 P:(DE-Juel1)169421 |
913 | 1 | _ | |a DE-HGF |b Key Technologies |l Engineering Digital Futures – Supercomputing, Data Management and Information Security for Knowledge and Action |1 G:(DE-HGF)POF4-510 |0 G:(DE-HGF)POF4-511 |3 G:(DE-HGF)POF4 |2 G:(DE-HGF)POF4-500 |4 G:(DE-HGF)POF |v Enabling Computational- & Data-Intensive Science and Engineering |9 G:(DE-HGF)POF4-5112 |x 0 |
914 | 1 | _ | |y 2022 |
915 | _ | _ | |a OpenAccess |0 StatID:(DE-HGF)0510 |2 StatID |
920 | _ | _ | |l no |
920 | 1 | _ | |0 I:(DE-Juel1)JSC-20090406 |k JSC |l Jülich Supercomputing Center |x 0 |
980 | _ | _ | |a contb |
980 | _ | _ | |a VDB |
980 | _ | _ | |a UNRESTRICTED |
980 | _ | _ | |a I:(DE-Juel1)JSC-20090406 |
980 | 1 | _ | |a FullTexts |
Library | Collection | CLSMajor | CLSMinor | Language | Author |
---|