other forms
(0.002 seconds)
41—50 of 129 matching pages
41: 9.16 Physical Applications
…
►The frequent appearances of the Airy functions in both classical and quantum physics is associated with wave equations with turning points, for which asymptotic (WKBJ) solutions are exponential on one side and oscillatory on the other.
…
►Other applications appear in the study of instability of Couette flow of an inviscid fluid.
…
►These first appeared in connection with the equation governing the evolution of long shallow water waves of permanent form, generally called solitons, and are predicted by the Korteweg–de Vries (KdV) equation (a third-order nonlinear partial differential equation).
…
►Solutions of the Schrödinger equation involving the Airy functions are given for other potentials in Vallée and Soares (2010).
…
42: 6.2 Definitions and Interrelations
43: 2.9 Difference Equations
…
►Provided that is not zero or an integer, (2.9.1) has independent solutions , , of the form
…
►For analogous results for difference equations of the form
…
►
§2.9(iii) Other Approximations
…44: 1.18 Linear Second Order Differential Operators and Eigenfunction Expansions
…
►These are based on the Liouville normal form of (1.13.29).
…
►
…
►
…
►compare (1.18.30) and (1.18.45), and the eigenfunction expansions are of the form
…
►Consider formally self-adjoint operators of the form
…
45: 9.13 Generalized Airy Functions
…
►Equations of the form
…
►Swanson and Headley (1967) define independent solutions and of (9.13.1) by
…
►
…
46: 11.13 Methods of Computation
…
►Other integrals that appear in §11.5(i) have highly oscillatory integrands unless is small.
…
►Then from the limiting forms for small argument (§§11.2(i), 10.7(i), 10.30(i)), limiting forms for large argument (§§11.6(i), 10.7(ii), 10.30(ii)), and the connection formulas (11.2.5) and (11.2.6), it is seen that and can be computed in a stable manner by integrating forwards, that is, from the origin toward infinity.
…
47: 27.16 Cryptography
…
►To code a piece , raise to the power and reduce modulo to obtain an integer (the coded form of ) between and .
…
►In other words, to recover from we simply raise to the power and reduce modulo .
…
►For further information see Apostol and Niven (1994, p. 24), and for other applications to cryptography see Menezes et al. (1997) and Schroeder (2006).
48: About the Project
…
►The results have been published in book form as the NIST Handbook of Mathematical Functions, by Cambridge University Press, and disseminated in the free electronic Digital Library of Mathematical Functions.
…
► Olver, Editor-in-Chief and Mathematics Editor of the DLMF, the other Editors initiated an effort aimed at updating the organizational structure of the DLMF project.
…
►They will be called upon to help deal with reports of suspected errors and suggestions for additions or other modifications to the chapters.
…
►The complete list of Editors, Senior Associate Editors, Associate Editors, and other currently active contributors to the DLMF Project are listed on the Staff page.
…
49: 15.14 Integrals
…
►Integrals of the form
and more complicated forms are given in Apelblat (1983, pp. 370–387), Prudnikov et al. (1990, §§1.15 and 2.21), Gradshteyn and Ryzhik (2000, §7.5) and Koornwinder (2015).
…
►For other integral transforms see Erdélyi et al. (1954b), Prudnikov et al. (1992b, §4.3.43), and also §15.9(ii).
…
50: 27.2 Functions
…
►An equivalent form states that the th prime (when the primes are listed in increasing order) is asymptotic to as :
…Other examples of number-theoretic functions treated in this chapter are as follows.
…