Results 71 to 80 of about 66,979 (212)
Quantum statistics and noncommutative black holes
We study the behaviour of a scalar field coupled to a noncommutative black hole which is described by a $\kappa$-cylinder Hopf algebra. We introduce a new class of realizations of this algebra which has a smooth limit as the deformation parameter ...
A. Samsarov +4 more
core +1 more source
A highly accurate numerical method is given for the solution of boundary value problem of generalized Bagley‐Torvik (BgT) equation with Caputo derivative of order 0<β<2$$ 0<\beta <2 $$ by using the collocation‐shooting method (C‐SM). The collocation solution is constructed in the space Sm+1(1)$$ {S}_{m+1}^{(1)} $$ as piecewise polynomials of degree at ...
Suzan Cival Buranay +2 more
wiley +1 more source
Integral closure of rings of integer-valued polynomials on algebras
Let $D$ be an integrally closed domain with quotient field $K$. Let $A$ be a torsion-free $D$-algebra that is finitely generated as a $D$-module. For every $a$ in $A$ we consider its minimal polynomial $\mu_a(X)\in D[X]$, i.e.
G. Peruginelli +10 more
core +1 more source
Existence Analysis of a Three‐Species Memristor Drift‐Diffusion System Coupled to Electric Networks
ABSTRACT The existence of global weak solutions to a partial‐differential‐algebraic system is proved. The system consists of the drift‐diffusion equations for the electron, hole, and oxide vacancy densities in a memristor device, the Poisson equation for the electric potential, and the differential‐algebraic equations for an electric network.
Ansgar Jüngel, Tuấn Tùng Nguyến
wiley +1 more source
Software Implementation of the Epps-Pulley Criterion in Matlab Modeling Environment
Purpose. Modeling systems and programming platforms provide broad opportunities for the use of statistical tools in research activities. Since the normal distribution is one of the most common distribution laws, the criterion for checking the sample for ...
A. A. Tipikin +2 more
doaj +3 more sources
Mathematical Model Using LU Decomposition as Cryptographic System
Cryptography plays a significant role in protecting privacy and secrecy in modern communications. The paper describes a novel text encrypt and decrypt scheme based on LU Matrix Decomposition, a numerical method.
Basim Najim AL-Din Abed +4 more
doaj +1 more source
Lax Operator for the Quantised Orthosymplectic Superalgebra U_q[osp(2|n)]
Each quantum superalgebra is a quasi-triangular Hopf superalgebra, so contains a \textit{universal $R$-matrix} in the tensor product algebra which satisfies the Yang-Baxter equation.
Baxter R J +14 more
core +1 more source
Robust Linearization and Eigenvalue Analysis of General Complex Constrained Multibody Systems
ABSTRACT The derivation of linearized equations and subsequent eigenvalue analysis is the basis for tasks such as frequency‐domain response analysis, control design, and stability assessment for mechanical systems. However, for general multibody systems with redundant or nonholonomic constraints, practical challenges persist in achieving numerically ...
Zhiwen Xiao, Gexue Ren
wiley +1 more source
ABSTRACT In this work, a new event‐triggered adaptive first‐order sliding mode control method is proposed for nonlinear systems with constant time delays, modeled by interval type‐2 Takagi–Sugeno (T–S) fuzzy systems. To handle matched disturbances with unknown upper bounds, a non‐overestimating adaptation strategy for the control coefficient is ...
Rodrigo Possidonio Noronha +1 more
wiley +1 more source
Idempotents and structures of rings
We study a ring containing a complete set of orthogonal idempotents as a generalized matrix ring via its Peirce decomposition. We focus on the case where some of the underlying bimodule homomorphisms are zero.
Anh, P. N. +2 more
core +1 more source

