Results 41 to 50 of about 569,781 (362)
The biHecke monoid of a finite Coxeter group and its representations [PDF]
For any finite Coxeter group W, we introduce two new objects: its cutting poset and its biHecke monoid. The cutting poset, constructed using a generalization of the notion of blocks in permutation matrices, almost forms a lattice on W.
Albert +14 more
core +3 more sources
In this work, a novel model is presented that describes thermal diffusion processes through non-local semiconductor materials. The material under study is subjected to the influence of a strong magnetic field, which creates a Hall current.
Abeer Alhashash +5 more
doaj +1 more source
Indroduction: The novel model of a non-local elastic semiconductor material that is microelongated is created. The process of photothermal transfer is responsible for the stimulation of the material. Photo-thermoelastic theories are used when the thermal
Ashraf M. Farhan +7 more
doaj +1 more source
Probabilistic logics based on Riesz spaces [PDF]
We introduce a novel real-valued endogenous logic for expressing properties of probabilistic transition systems called Riesz modal logic. The design of the syntax and semantics of this logic is directly inspired by the theory of Riesz spaces, a mature ...
Robert Furber, Radu Mardare, Matteo Mio
doaj +1 more source
Wavelet-based systematic risk estimation: application on GCC stock markets: the Saudi Arabia case
Systematic risk estimation is widely applied by investors and managers in order to predict risks in the market. One of the most applied measures of risk is the so-called Capital Asset Pricing Model, shortly CAPM.
Anouar Ben Mabrouk
doaj +1 more source
A Note on Powers in Finite Fields [PDF]
The study of solutions to polynomial equations over finite fields has a long history in mathematics and is an interesting area of contemporary research.
Aabrandt, Andreas +1 more
core +2 more sources
Application of modern algebra in cryptography
With the rapid development of the digital age, information security, from personal data to national security, is becoming increasingly crucial. Information security primarily refers to the computation and processing of diverse information in computer ...
Yuling Qian
semanticscholar +1 more source
We quantise the classical gauge theory of $N=2\ w_\infty$-supergravity and show how the underlying $N=2$ super-$w_\infty$ algebra gets deformed into an $N=2$ super-$W_\infty$ algebra. Both algebras contain the $N=2$ super-Virasoro algebra as a subalgebra.
Bais +29 more
core +7 more sources
Three Hopf algebras from number theory, physics & topology, and their common background I: operadic & simplicial aspects [PDF]
We consider three a priori totally different setups for Hopf algebras from number theory, mathematical physics and algebraic topology. These are the Hopf algebra of Goncharov for multiple zeta values, that of Connes-Kreimer for renormalization, and a ...
Imma G'alvez-Carrillo +2 more
semanticscholar +1 more source
Explicit decomposition of a rational prime in a cubic field
We give the explicit decomposition of the principal ideal 〈p〉 (p prime) in a cubic field.
Saban Alaca +2 more
doaj +1 more source

