Skip to Content
You are currently on the new version of our website. Access the old version .
  • Mathematical and Computational Applications is published by MDPI from Volume 21 Issue 1 (2016). Previous articles were published by another publisher in Open Access under a CC-BY (or CC-BY-NC-ND) licence, and they are hosted by MDPI on mdpi.com as a courtesy and upon agreement with Association for Scientific Research (ASR).

Mathematical and Computational Applications, Volume 10, Issue 2

2005 August - 15 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (15)

  • Article
  • Open Access
5 Citations
1,464 Views
13 Pages

1 August 2005

In this paper a procedure is considered for a new modified goodness of fit test for the normal type2 censored population. Samples of sizes 10(10)60 are chosen and censored at a specified percentage. Cramer von Mises and Anderson Darling test statisti...

  • Article
  • Open Access
4 Citations
1,420 Views
6 Pages

0-→0+ First Forbidden β-Decay Matrix Elements in Spherical Nuclei

  • İsmail Kenar,
  • Cevat Selam and
  • Atalay Küçükbursa

1 August 2005

In this study, the first forbidden beta decay matrix elements have been directly calculated within Saxon-Woods potential. Procedures for calculating the relevant matrix elements and combining them to form the decay rate are described. Calculations ha...

  • Article
  • Open Access
1,374 Views
7 Pages

The Identification of Nondominated and Efficient Paths on a Network

  • G. R. Jahanshahloo,
  • F. Hossienzadeh Lotfi,
  • N. Shoja,
  • G. Tohidi and
  • S. Razavyan

1 August 2005

In this paper, we present an application of 0-1 linear programming problem in the indentification of the nondominated paths on a network. To find efficient paths, an adaptationof the Additive model, which called Additive model without output, is used.

  • Article
  • Open Access
1,536 Views
7 Pages

1 August 2005

In plane Lorentzian geometry it is studied points, timelike, spacelike and lightlike lines, triangles, etc [4]. On the hyperbolic sphere, there are points, but there are no straight lines, at least not in the usual sense. However, straight timelike l...

  • Article
  • Open Access
7 Citations
1,436 Views
10 Pages

1 August 2005

In the traditional way of computing the arithmetic mean, there are various alternatives that support the same objective. Since the proposal of fuzzy sets by Zadeh, Bellman and Zadeh have developed a basic framework for decision-making in a fuzzy envi...

  • Article
  • Open Access
3 Citations
1,342 Views
10 Pages

1 August 2005

The main purpose of this work is to perform symmetry classification of a system of partial differential equations for energy-transport in semiconductors. In the case where there are symmetries, they are used to reduce the number of independent variab...

  • Article
  • Open Access
6 Citations
1,502 Views
11 Pages

1 August 2005

An extensive Monte Carlo study is performed to analyze a multi-server, bulk arrival (M [x]M/C; C-1/FCFS) queuing system. The system breakdown limits the system to serve with either C or (C-1) servers. The server breakdown has equal chance over all se...

  • Article
  • Open Access
1,308 Views
7 Pages

1 August 2005

The couplings of three gauge bosons ZZγ* , Zγγ* , ZγZ* and ZZZ* are found in the electroweak standard model at one loop level. Bosonic one loop diagrams do not contribute to these couplings and only fermionic contributions survive. Ward identities an...

  • Article
  • Open Access
1,362 Views
10 Pages

1 August 2005

In this paper, we evaluate a key Eulerian integral involving Sister Celine's polynomials of several complex variables defines by the author. Our general Eulerian intergral formula are shown to provide the key formula from which numerous other potenti...

  • Article
  • Open Access
1,242 Views
13 Pages

1 August 2005

In this paper we investigate the solvability of a certain class of nonlinear singular integro-differential equations with Cauchy kernel in the usual Holder space and its generalization by producing the sufficient conditions for the convergence of the...

  • Article
  • Open Access
4 Citations
1,465 Views
7 Pages

1 August 2005

The Robbins-Monro stochastic approximation procedure is modified so as to be applicable in the presence of compound delayed observations. The efficiency of the modified procedure is investigated. The asymptotic values of the efficiency are compared w...

  • Article
  • Open Access
1 Citations
1,449 Views
9 Pages

1 August 2005

Excitation of hydrogen atoms, being initially in the excited 2p state by colliding with protons (p) and antiprotons (p) is investigated within the impact parameter method. The calculation involves the n = 1,2,3,4 states of the target in addition to c...

  • Article
  • Open Access
26 Citations
1,766 Views
5 Pages

1 August 2005

This paper provides a new simple heuristic algorithm for a ‘3-Machine, n-job’ flow-shop scheduling problem in which jobs are attached with weights to indicate their relative importance and the transportation time and break down intervals of machine a...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Math. Comput. Appl. - ISSN 2297-8747