- Your Search:
- Department_facet:"Mathematics and Statistics"
*[x]*

- Department_facet:"Mathematics and Statistics"
- Limited to:
- no limits selected

# Results

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] Historical temperature data from the Canadian Atlantic province of Prince Edward Island is analyzed over the period from April 1913 to July 2013 in order to develop time series models that have the ability to produce accurate forecasting of minimum and maximum monthly average temperatures. In this p... |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] The renormalization equations emerge from a Greenian-matrix solution of the discretized Schr¨odinger equation. A by-product of these equations is the decimation process, which enables substituted-benzenes to be mapped onto corresponding dimers, that are used to construct the series and parallel cir... |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] The forecast performance of alternative artificial neural network (ANN) models was studied to compare their forecast accuracy to the fractionally integrated autoregressive moving average model using monthly rainfall data for the Canadian province of Prince Edward Island (PEI). A multilayer feed-forw... |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] We analyze the polynomial solutions of the linear differential equation where is a -degree polynomial. We discuss all the possible polynomial solutions and their dependence on the parameters of the polynomials . Special cases are related to known differential equations of mathematical physics. Class... |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] The problem is to determine the number of ‘cops’ needed to capture a ‘robber’ in a game in which the cops always know the location of the robber, and the cops and robber move alternately along edges of a reflexive graph. The cops capture the robber if one of them occupies the same vertex as ... |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] Analytic evaluation of Gordon's integral
Jj(±p)c(b,b′;λ,w,z)=∫∞0xc+j−1e−λx1F1(b;c;wx)1F1(b′;c±p;zx)dx,
are given along with convergence conditions. It shows enormous number of definite integrals, frequently appear in theoretical and mathematical physics applications, easily ded... |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] A model physical problem is studied in which a system of two electrons is subject either to soft
confinement by means of attractive oscillator potentials or by entrapment within an impenetrable
spherical box of finite radius R. When hard confinement is present the oscillators can be switched
off. Ex... |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] The eigenvalues Ednl (a, c) of the d-dimensional Schrödinger equation with the Cornell potential V(r) = −a/r + c r, a, c > 0 are analyzed by means of the envelope method and the asymptotic iteration method (AIM). Scaling arguments show that it is suffcient to know E(1, λ), and the envelope metho... |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] The d-dimensional Schrödinger's equation is analyzed with regard to the existence of exact solutions for polynomial potentials. Under certain conditions on the interaction parameters, we show that the polynomial potentials V8(r) = ∑k = 18αkrk,α8>0 and V10(r) = ∑k = 110αkrk,α10>0 are exactly... |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] We analyze the polynomial solutions of the linear differential equation p2(x)y″+p1(x)y′+p0(x)y=0 where pj(x) is a jth-degree polynomial. We discuss all the possible polynomial solutions and their dependence on the parameters of the polynomials pj(x). Special cases are related to known differenti... |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] The asymptotic iteration method is used to find exact and approximate solutions of Schrödinger’s equation for a number of one-dimensional trigonometric potentials (sine-squared, double-cosine, tangent-squared, and complex cotangent). Analytic and approximate solutions are obtained by first using ... |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] Shannon entropy for the position and momentum eigenstates
of an asymmetric trigonometric Rosen–Morse potential
for the ground and first excited states is evaluated. The
position and momentum information entropies Sx and Sp
are calculated numerically. Also, we find that S1
x is obtained
analyticall... |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] A tensorial Green-function treatment of the electronic transmission properties of an atomic wire T-junction is presented within the framework of the tight-binding approximation. The adoption of the tensorial formalism enables overlap effects to be included in a straightforward manner, without the ne... |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] In this article we study a natural weakening – which we refer to as paratransitivity – of the well-known notion of transitivity of an algebra AA of linear operators acting on a finite-dimensional vector space VV. Given positive integers k and m, we shall say that such an algebra AA is (k,m)(k,m)... |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] In this paper, the authors continue the analysis, first undertaken in Livshits et al. (2013) [2], of algebras AA of linear transformations on an n-dimensional complex vector space VV which have the property that if WW is a k-dimensional subspace of VV, then the image of WW under the action of the al... |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] In [M.R. Burke, Large entire cross-sections of second category sets in Rn+1Rn+1, Topology Appl. 154 (2007) 215–240], a model was constructed in which for any everywhere second category set A⊆Rn+1A⊆Rn+1 there is an entire function f:Rn→Rf:Rn→R which cuts a large section through A in the sen... |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] The one-dimensional Schr ̈odinger’s equation is analysed w
ith regard to the existence of
exact solutions for decatic polynomial potentials. Under c
ertain conditions on the potential’s pa-
rameters, we show that the decatic polynomial potential
V
(
x
) =
ax
10
+
bx
8
+
cx
6
+
dx
4
+
ex
2
,
a >... |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] Let T = {τ1, τ2, ..., τK; p1, p2, ..., pK} be a position dependent random map on [0, 1], where {τ1, τ2, ..., τK} is a collection of nonsingular maps on [0, 1] into [0, 1] and {p1, p2, ..., pK} is a collection of position dependent probabilities on [0, 1]. We assume that the random map T has a ... |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] Using the orthonormality of the 2D-Zernike polynomials reproducing kernels, reproducing kernel Hilbert spaces and ensuing coherent states are attained. With the aid of the so obtained coherent states the complex unit disc is quantized. Associated upper symbols, lower symbols and related generalized ... |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] |

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.] We consider the geometric Markov renewal processes (GMRP) as a model for a security market. Normal deviations of the geometric Markov renewal processes for ergodic averaging and double averaging schemes are derived. We introduce Poisson averaging scheme for the geometric Markov renewal processes. Eu... |