Browse

1 - 10 of 1,791 items :

  • Physics, other x
Clear All

Abstract

Emerging as a new field, quantum computation has reinvented the fundamentals of Computer Science and knowledge theory in a manner consistent with quantum physics. The fact that quantum computation has superior features and new events than classical computation provides benefits in proving mathematical theories. With advances in technology, the nonlinear partial differential equations are used in almost every area, and many difficulties have been overcome by the solutions of these equations. In particular, the complex solutions of KdV and Burgers equations have been shown to be used in modeling a simple turbulence flow. In this study, Burger-like equation with complex solutions is defined in Hilbert space and solved with an example. In addition, these solutions were analyzed. Thanks to the Quantum Burgers-Like equation, the nonlinear differential equation is solved by linearizing. The pattern changes of time made the result linear. This means that the Quantum Burgers-Like equation can be used to smoothen the sonic processing.

Abstract

In this study, we present some new results for the time fractional mixed boundary value problems. We consider a generalization of the Heat - conduction problem in two dimensions that arises during the manufacturing of p - n junctions. Constructive examples are also provided throughout the paper. The main purpose of this article is to present mathematical results that are useful to researchers in a variety of fields.

Abstract

Various order of implicit method has been formulated for solving initial value problems having an initial singular point. The method provides better result than those obtained by used implicit formulae developed based on Euler and Runge-Kutta methods. Romberg scheme has been used for obtaining more accurate result.

Abstract

The purpose of this study is extended the TOPSIS method based on interval-valued fuzzy set in decision analysis. After the introduction of TOPSIS method by Hwang and Yoon in 1981, this method has been extensively used in decision-making, rankings also in optimal choice. Due to this fact that uncertainty in decision-making and linguistic variables has been caused to develop some new approaches based on fuzzy-logic theory. Indeed, it is difficult to achieve the numerical measures of the relative importance of attributes and the effects of alternatives on the attributes in some cases. In this paper to reduce the estimation error due to any uncertainty, a method has been developed based on interval-valued fuzzy set. In the suggested TOPSIS method, we use Shannon entropy for weighting the criteria and apply the Euclid distance to calculate the separation measures of each alternative from the positive and negative ideal solutions to determine the relative closeness coefficients. According to the values of the closeness coefficients, the alternatives can be ranked and the most desirable one(s) can be selected in the decision-making process.

Abstract

In this paper, the new exact solutions of nonlinear conformable fractional partial differential equations(CFPDEs) are achieved by using auxiliary equation method for the nonlinear space-time fractional Klein-Gordon equation and the (2+1)-dimensional time-fractional Zoomeron equation. The technique is easily applicable which can be applied successfully to get the solutions for different types of nonlinear CFPDEs. The conformable fractional derivative(CFD) definitions are used to cope with the fractional derivatives.

Abstract

Compactification is the process or result of making a topological space into a compact space. An embedding of a topological space X as a dense subset of a compact space is called a compactification of X. There are a lot of compactification methods but we study with Fan- Gottesman compactification. A topological space X is said to be scattered if every nonempty subset S of X contains at least one point which is isolated in S. Compact scattered spaces are important for analysis and topology. In this paper, we investigate the relation between the Fan-Gottesman compactification of T 3 space and scattered spaces. We show under which conditions the Fan-Gottesman compactification X * is a scattered.

Abstract

The main purpose of this article is to obtain the new solutions of fractional bad and good modified Boussinesq equations with the aid of auxiliary equation method, which can be considered as a model of shallow water waves. By using the conformable wave transform and chain rule, nonlinear fractional partial differential equations are converted into nonlinear ordinary differential equations. This is an important impact because both Caputo definition and Riemann–Liouville definition do not satisfy the chain rule. By using conformable fractional derivatives, reliable solutions can be achieved for conformable fractional partial differential equations.

Abstract

This paper proposes obtaining the new wave solutions of time fractional sixth order nonlinear Equation (KdV6) using sub-equation method where the fractional derivatives are considered in conformable sense. Conformable derivative is an understandable and applicable type of fractional derivative that satisfies almost all the basic properties of Newtonian classical derivative such as Leibniz rule, chain rule and etc. Also conformable derivative has some superiority over other popular fractional derivatives such as Caputo and Riemann-Liouville. In this paper all the computations are carried out by computer software called Mathematica.

Abstract

Cryptology is defined as the science of making communication incomprehensible to third parties who have no right to read and understand the data or messages. Cryptology consists of two parts, namely, cryptography and cryptanalysis. Cryptography analyzes methods of encrypting messages, and cryptanalysis analyzes methods of decrypting encrypted messages. Encryption is the process of translating plaintext data into something that appears to be random and meaningless. Decryption is the process of converting this random text into plaintext. Cloud computing is the legal transfer of computing services over the Internet. Cloud services let individuals and businesses to use software and hardware resources at remote locations. Widespread use of cloud computing raises the question of whether it is possible to delegate the processing of data without giving access to it. However, homomorphic encryption allows performing computations on encrypted data without decryption. In homomorphic encryption, only the encrypted version of the data is given to the untrusted computer to process. The computer will perform the computation on this encrypted data, without knowing anything on its real value. Finally, it will send back the result, and whoever has the proper deciphering key can decrypt the cryptogram correctly. The decrypted result will be equal to the intended computed value. In this paper, homomorphic encryption and their types are reviewed. Also, a simulation of somewhat homomorphic encryption is examined.

Abstract

In this paper, solution of the following difference equation is examined

xn+1=xn131+xn1xn3xn5xn7xn9xn11,
where the initial conditions are positive real numbers.