منابع مشابه
Comparison of KP and BBM-KP Models
It is shown that the solutions of the pure initial-value problem for the KP and regularized KP equations are the same, within the order of accuracy attributable to either, on the time scale 0 ≤ t ≤ −3/2 , during which nonlinear and dispersive effects may accumulate to make an order-one relative difference to the wave profiles. under the Creative Commons Attribution License, which permits unrest...
متن کاملKp forecast models
[1] Magnetically active times, e.g., Kp > 5, are notoriously difficult to predict, precisely the times when such predictions are crucial to the space weather users. Taking advantage of the routinely available solar wind measurements at Langrangian point (L1) and nowcast Kps, Kp forecast models based on neural networks were developed with the focus on improving the forecast for active times. To ...
متن کاملMultimatrix Models and the KP-Hierarchy
We analyze the critical points of multimatrix models. In particular we find the critical points of highest multicriticality of the symmetric two-matrix model with an even potential. We solve the model on the sphere and show that these critical points correspond to the (p, q) minimal models with p + q =odd. Based on this experience we give a formulation of minimal models coupled to quantum gravi...
متن کاملq-Deformed KP Hierarchy and q-Deformed Constrained KP Hierarchy
Using the determinant representation of gauge transformation operator, we have shown that the general form of τ function of the q-KP hierarchy is a q-deformed generalized Wronskian, which includes the q-deformed Wronskian as a special case. On the basis of these, we study the q-deformed constrained KP (q-cKP) hierarchy, i.e. l-constraints of q-KP hierarchy. Similar to the ordinary constrained K...
متن کاملKP+ : Fixing Availability Issues on KP Ownership Transfer Protocols
Ownership Transfer Protocols for RFID allow transferring the rights over a tag from a current owner to a new owner in a secure and private way. Recently, Kapoor and Piramuthu have proposed two schemes which solve most of the security weaknesses detected in previously published protocols. However, this paper reviews this work and points out that such schemes still present some practical and secu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Mathematics and Mathematical Sciences
سال: 2007
ISSN: 0161-1712,1687-0425
DOI: 10.1155/2007/37274