Results 91 to 100 of about 3,208,584 (371)

Two Dimensional String Theory and the Topological Torus

open access: yes, 1992
We analyze topological string theory on a two dimensional torus, focusing on symmetries in the matter sector. Even before coupling to gravity, the topological torus has an infinite number of point-like physical observables, which give rise via the BRST ...
Alvarez-Gaumé   +63 more
core   +1 more source

Sustainable Thermal Solutions: Enhancing Heat Transfer with Turbulators and Nanofluids

open access: yesAdvanced Energy and Sustainability Research, EarlyView.
Nanofluids, which are nanoparticle suspensions in base fluid, facilitate heat transmission due to their improved thermal conductivity. Turbulators, which are inserts into fluid flow channels, disturb the flow, increasing turbulence and hence the heat transfer rate.
Zafar Said   +9 more
wiley   +1 more source

A study of the nonlocal solution of p-Laplacian fractional elliptic problems via approximation methods

open access: yesBoundary Value Problems
In the present paper, we are concerned with the existence of nonnegative solutions for two Kirchhoff-type problems driven by a fractional p-Laplacian operator, ( − Δ ) p s $(-\Delta )_{p}^{s}$ , in a bounded smooth domain Ω of R N $\mathbb{R}^{N}$ with N
Omar Djidel   +4 more
doaj   +1 more source

Graded near-rings

open access: yesAnalele Stiintifice ale Universitatii Ovidius Constanta: Seria Matematica, 2016
In this paper, we consider graded near-rings over a monoid G as generalizations of graded rings over groups, and study some of their basic properties.
Dumitru Mariana   +2 more
doaj   +1 more source

Baxter Algebras, Stirling Numbers and Partitions [PDF]

open access: yesJ. Algebra Appl. 4 (2005), 153-164, 2004
Recent developments of Baxter algebras have lead to applications to combinatorics, number theory and mathematical physics. We relate Baxter algebras to Stirling numbers of the first kind and the second kind, partitions and multinomial coefficients. This allows us to apply congruences from number theory to obtain congruences in Baxter algebras.
arxiv  

Normal ordering associated with λ-Stirling numbers inλ-Shift algebra [PDF]

open access: yesarXiv, 2023
The Stirling numbers of the second kind are related to normal orderings in the Weyl algebra, while the unsigned Stirling numbers of the first kind are related to normal orderings in the shift algebra. Kim-Kim introduced a {\lambda}-analogue of the unsigned Stirling numbers of the first kind and that of the r-Stirling numbers of the first kind.
arxiv  

Algebra and number theory [PDF]

open access: yes, 2014
Робоча програма Алгебра і теорія чисел для студентів галузі знань 0402 «Фізико-математичні науки», напряму підготовки 6.040201 «Математика*».Рабочая программа Алгебра и теория чисел для студентов области знаний 0402 «Физико-математические науки ...
Радченко, Сергій Петрович
core  

An integrated scheduling and control scheme with two economic layers for demand side management of chemical processes

open access: yesAIChE Journal, EarlyView.
Abstract Integrated dynamic scheduling (IDS) and economic nonlinear model predictive control (eNMPC) enable economic operation of chemical plants subject to volatile energy prices. Herein, we combine the two concepts into an integrated two‐layer scheme. Therein, IDS performs “long‐horizon” scheduling on a day‐ahead (DA) market and eNMPC “short‐horizon”
Jan C. Schulze   +3 more
wiley   +1 more source

Tensor Constructions of Open String Theories I: Foundations

open access: yes, 1997
The possible tensor constructions of open string theories are analyzed from first principles. To this end the algebraic framework of open string field theory is clarified, including the role of the homotopy associative A_\infty algebra, the odd ...
Albert   +31 more
core   +1 more source

On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices

open access: yesIEEE Transactions on Information Forensics and Security, 2015
Human identification protocols are challenge-response protocols that rely on human computational ability to reply to random challenges from the server based on a public function of a shared secret and the challenge to authenticate the human user.
H. Asghar   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy