Browsing Mathematics / Matematik by Type "conferenceObject"
Now showing items 120 of 35

Abelian ChernSimons vortices and holomorphic Burgers hierarchy
(Springer, 200707)We consider the Abelian ChernSimons gauge field theory in 2+1 dimensions and its relation to the holomorphic Burgers hierarchy. We show that the relation between the complex potential and the complex gauge field as in ... 
Applications of graph coloring
(Springer, 2005)A graph G is a mathematical structure consisting of two sets V(G) (vertices of G) and E(G) (edges of G). Proper coloring of a graph is an assignment of colors either to the vertices of the graphs, or to the edges, in such ... 
Comparing the pre and postspecified peer models for key agreement
(Springer, 2008)In the prespecified peer model for key agreement, it is assumed that a party knows the identifier of its intended communicating peer when it commences a protocol run. On the other hand, a party in the postspecified peer ... 
Damped parametric oscillator and exactly solvable complex Burgers equations
(IOP Publishing, 2012)We obtain exact solutions of a parametric Madelung fluid model with dissipation which is linearazible in the form of Schrödinger equation with time variable coefficients. The corresponding complex Burgers equation is solved ... 
Degenerate fourvirtualsoliton resonance for the KPII
(Springer, 200507)We propose a method for solving the (2+1)dimensional Kadomtsev Petviashvili equation with negative dispersion (KPII) using the second and third members of the disipative version of the AKNS hierarchy. We show that ... 
Ecalculus at IZTECH
(Springer, 2006)In today's new economy, characterized by industrial revolutions, globalization and information technology changes traditional classroom and teaching methods. Calculus is the basic course for the fresher at university. ... 
Enabling cooperation, resource allocation and receiver selection across cells: Complementary fractional frequency reuse
(IEEE, 2013)For a multicell multiple access channel, we develop a comprehensive cooperative communication framework: we propose a novel complementary fractional frequency reuse (FFR) strategy tailored specifically for pairwise user ... 
Exact quantization of CauchyEuler type forced parametric oscillator
(IOP Publishing, 201610)Driven and damped parametric quantum oscillator is solved by WeiNorman Lie algebraic approach, which gives the exact form of the evolution operator. This allows us to obtain explicitly the probability densities, timeevolution ... 
The extended discrete (G′/G)expansion method and its application to the relativistic toda lattice system
(American Institute of Physics Publising, 2009)We propose the extended discrete (G′/G)expansion method for directly solving nonlinear differentialdifference equations. For illustration, we choose the relativistic Toda lattice system. We derive further discrete hyperbolic ... 
Filamentary structures of the cosmic web and the nonlinear Schrödinger type equation
(IOP Publishing, 2011)We show that the filamentary type structures of the cosmic web can be modeled as solitonic waves by solving the reaction diffusion system which is the hydrodynamical analogous of the nonlinear Schrödinger type equation. ... 
From qanalytic functions to double qanalytic Hermite binomials and qtraveling waves
(IOP Publishing, 201610)We extend the concept of qanalytic function in two different directions. First we find expansion of qbinomial in terms of qHermite polynomials, analytic in two complex arguments. Based on this representation, we introduce ... 
Mathematica applications on time scales
(Springer, 2005)Stefan Hilger introduced the calculus on time scales in order to unify continuous and discrete analysis in 1988. The study of dynamic equations is an active area of research since time scales unifies both discrete and ... 
Modeling leakage of ephemeral secrets in tripartite/group key exchange
(Springer, 2010)Recent advances in the design and analysis of secure twoparty key exchange (2KE) such as the leakage of ephemeral secrets used during the attacked sessions remained unnoticed by the current models for group key exchange ... 
Multiparty offtherecord messaging
(Association for Computing Machinery, 2009)Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation is no less important than secrecy and ... 
New casimir energy calculations
(World Scientific Publishing, 2007)New Casimir energy results for massless scalar field in some 3 dimensional cavities are presented. We attempted to discuss the correlation between the sign and the magnitude of the energy and the shape of the cavities. ... 
New mathematical model for finding minimum vertex cut set
(IEEE, 2012)In this paper, we consider the vertex separator problem. Given an undirected graph G, the vertex separator problem consists in identifying a minimum number of vertex set whose removal disconnects G. We present a new ... 
The NewtonWigner localization concept and noncommutative space
(Kluwer Academic Publishers, 2005)In the formulation of the NewtonWigner postulates for the relativistic localized states the hypothesis of commutativity of the position operator components is silently accepted as an evident fact. In the present work it ... 
On classical and quantum qoscillators in the relativistic theory
(Springer, 200411)The factorization method, applied to the finitedifference Schrödinger equation in the relativistic configurational space, allows to consider the qdeformations as a relativistic effect. In particular, different factorizations ... 
On the importance of publickey validation in the MQV and HMQV key agreement protocols
(Springer, 2006)HMQV is a hashed variant of the MQV key agreement protocol proposed by Krawczyk at CRYPTO 2005. In this paper, we present some attacks on HMQV and MQV that are successful if public keys are not properly validated. In ... 
Privacypreserving targeted advertising scheme for IPTV using the cloud
(SciTe Press, 2012)In this paper, we present a privacypreserving scheme for targeted advertising via the Internet Protocol TV (IPTV). The scheme uses a communication model involving a collection of viewers/subscribers, a content provider ...