Results 21 to 30 of about 1,995,067 (86)
A proof of Pollaczek-Spitzer identity
In this note we derive a proof of Pollaczek-Spitzer identity using a generalization of Takacs ballot theorem.
S. Paramasamy
doaj +1 more source
Asymptotic symmetries in (d + 2)-dimensional gauge theories
We show that the subleading soft photon theorem in a (d + 2)-dimensional massless abelian gauge theory gives rise to a Ward identity corresponding to divergent large gauge transformations acting on the celestial sphere at null infinity.
Temple He, Prahar Mitra
doaj +1 more source
Celestial current algebra from Low’s subleading soft theorem [PDF]
The leading soft photon theorem implies that four-dimensional scattering amplitudes are controlled by a two-dimensional (2D) $U(1)$ Kac-Moody symmetry that acts on the celestial sphere at null infinity ($\mathcal{I}$).
E. Himwich, A. Strominger
semanticscholar +1 more source
Uniqueness and Liouville type results for radial solutions of some classes of k-Hessian equations
We establish a uniqueness theorem and a Liouville type result for positive radial solutions of some classes of nonlinear autonomous equation with the $k$-Hessian operator. We also give some interesting qualitative properties of solutions.
Mohamed Ben Chrouda
doaj +1 more source
Scalar characterization in Banach Jordan algebras
Using a Diagonalization Theorem obtained when the spectrum is Lipschitzian, we extend a result of G. Braatvedt on scalar characterization in Banach algebras to Banach-Jordan algebras.
Abdelaziz Maouche
doaj +1 more source
Sturm-Picone Comparison Theorem of Second-Order Linear Equations on Time Scales
This paper studies Sturm-Picone comparison theorem of second-order linear equations on time scales. We first establish Picone identity on time scales and obtain our main result by using it.
Shurong Sun, Chao Zhang
doaj +2 more sources
Existing security and identity-based vehicular communication protocols used in Vehicular Ad-hoc Networks (VANETs) to achieve conditional privacy-preserving mostly rely on an ideal hardware device called tamper-proof device (TPD) equipped in vehicles ...
Jing Zhang+4 more
semanticscholar +1 more source
We prove a combinatorial identity which arose from considering the relation rp(x,y,z)=(x+y−z)p−(xp+yp−zp) in connection with Fermat's last theorem.
Joseph Sinyor+2 more
doaj +1 more source
In this paper, we present a modified Schrödinger-type identity related to the Schrödinger-type boundary value problem with mixed boundary conditions and spatial heterogeneities.
Bo Meng
doaj +1 more source
Uniformly Primal Submodule over Noncommutative Ring
Let R be an associative ring with identity and M be a unitary right R-module. A submodule N of M is called a uniformly primal submodule provided that the subset B of R is uniformly not right prime to N, if there exists an element s∈M−N with sRB⊆N.The set
Lamis J. M. Abulebda
doaj +1 more source