Results 51 to 60 of about 16,850 (158)
On the Euler characteristic of S$S$‐arithmetic groups
Abstract We show that the sign of the Euler characteristic of an S$S$‐arithmetic subgroup of a simple algebraic group depends on the S$S$‐congruence completion only, except possibly in type 6D4${}^6 D_4$. Consequently, the sign is a profinite invariant for such S$S$‐arithmetic groups with the congruence subgroup property. This generalizes previous work
Holger Kammeyer, Giada Serafini
wiley +1 more source
The L$L$‐polynomials of van der Geer–van der Vlugt curves in characteristic 2
Abstract The van der Geer–van der Vlugt curves form a class of Artin–Schreier coverings of the projective line over finite fields. We provide an explicit formula for their L$L$‐polynomials in characteristic 2, expressed in terms of characters of maximal abelian subgroups of the associated Heisenberg groups.
Tetsushi Ito +2 more
wiley +1 more source
Hypergeometric motives from Euler integral representations
Abstract We revisit certain one‐parameter families of affine covers arising naturally from Euler's integral representation of hypergeometric functions. We introduce a partial compactification of this family. We show that the zeta function of the fibers in the family can be written as an explicit product of L$L$‐series attached to nondegenerate ...
Tyler L. Kelly, John Voight
wiley +1 more source
Toward quantized Picard-Vessiot theory, Further observations on our previous example [PDF]
It is quite natural to wonder whether there is a difference-differential equations, the Galois group of which is a quantum group that is neither commutative nor co-commutative.
Saito, Katsunori, Umemura, Hiroshi
core
FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan +6 more
wiley +1 more source
Secure Deployment of Smart Meters
A secure initialization process for smart meters is designed based on a systematic cybersecurity risk analysis of the deployment phase. Three initialization variants are defined and compared with respect to security, operational feasibility, and trust distribution.
David Kohout +4 more
wiley +1 more source
Galois Theory of Parameterized Differential Equations and Linear Differential Algebraic Groups
We present a Galois theory of parameterized linear differential equations where the Galois groups are linear differential algebraic groups, that is, groups of matrices whose entries are functions of the parameters and satisfy a set of differential ...
Cassidy, Phyllis J., Singer, Michael F.
core +2 more sources
Intergenerational Communication in the Workplace Among Teaching Staff at Universities
ABSTRACT In organisations characterised by generational diversity, information and knowledge exchange present both challenges and opportunities. Managing intergenerational relationships among teaching staff at higher education institutions necessitates, among other efforts, a critical review of communication processes.
Trinidad Mentado‐Labao +3 more
wiley +1 more source
The inverse problem of differential Galois theory over the field R(z)
We describe a Picard-Vessiot theory for differential fields with non algebraically closed fields of constants. As a technique for constructing and classifying Picard-Vessiot extensions, we develop a Galois descent theory.
Dyckerhoff, Tobias
core +1 more source

