Results 21 to 30 of about 2,863 (231)

Galois conjugation and multiboundary entanglement entropy

open access: yesJournal of High Energy Physics, 2020
We revisit certain natural algebraic transformations on the space of 3D topological quantum field theories (TQFTs) called “Galois conjugations.” Using a notion of multiboundary entanglement entropy (MEE) defined for TQFTs on compact 3-manifolds with ...
Matthew Buican, Rajath Radhakrishnan
doaj   +1 more source

Intergenerational Communication in the Workplace Among Teaching Staff at Universities

open access: yesHigher Education Quarterly, Volume 80, Issue 1, January 2026.
ABSTRACT In organisations characterised by generational diversity, information and knowledge exchange present both challenges and opportunities. Managing intergenerational relationships among teaching staff at higher education institutions necessitates, among other efforts, a critical review of communication processes.
Trinidad Mentado‐Labao   +3 more
wiley   +1 more source

On Hopf Galois Hirata extensions

open access: yesInternational Journal of Mathematics and Mathematical Sciences, 2003
Let H be a finite-dimensional Hopf algebra over a field K, H* the dual Hopf algebra of H, and B a right H*-Galois and Hirata separable extension of BH. Then B is characterized in terms of the commutator subring VB(BH) of BH in B and the smash product VB ...
George Szeto, Lianyong Xue
doaj   +1 more source

Equivariant v1,0⃗$v_{1,\vec{0}}$‐self maps

open access: yesBulletin of the London Mathematical Society, Volume 58, Issue 1, January 2026.
Abstract Let G$G$ be a cyclic p$p$‐group or generalized quaternion group, X∈π0SG$X\in \pi _0 S_G$ be a virtual G$G$‐set, and V$V$ be a fixed point free complex G$G$‐representation. Under conditions depending on the sizes of G$G$, X$X$, and V$V$, we construct a self map v:ΣVC(X)(p)→C(X)(p)$v\colon \Sigma ^V C(X)_{(p)}\rightarrow C(X)_{(p)}$ on the ...
William Balderrama   +2 more
wiley   +1 more source

A block encryption algorithm based on exponentiation transform

open access: yesCogent Engineering, 2020
This paper proposes a new block encryption algorithm for cryptographic information protection. It describes a new transformation method EM (Exponentiation Module), which is part of the algorithm, and a method of S-box obtaining.
Nursulu Kapalova   +3 more
doaj   +1 more source

The first two group theory papers of Philip Hall

open access: yesJournal of the London Mathematical Society, Volume 113, Issue 1, January 2026.
Abstract In this paper, we discuss the first two papers on soluble groups written by Philip Hall and their influence on the study of finite groups. The papers appeared in 1928 and 1937 in the Journal of the London Mathematical Society.
Inna Capdeboscq
wiley   +1 more source

The modular automorphisms of quotient modular curves

open access: yesMathematika, Volume 72, Issue 1, January 2026.
Abstract We obtain the modular automorphism group of any quotient modular curve of level N$N$, with 4,9∤N$4,9\nmid N$. In particular, we obtain some unexpected automorphisms of order 3 that appear for the quotient modular curves when the Atkin–Lehner involution w25$w_{25}$ belongs to the quotient modular group. We also prove that such automorphisms are
Francesc Bars, Tarun Dalal
wiley   +1 more source

Faster Positional‐Population Counts for AVX2, AVX‐512, and ASIMD

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 27-28, 25 December 2025.
ABSTRACT The positional population count operation pospopcnt counts for an array of w$$ w $$‐bit words how often each of the w$$ w $$ bits was set. Various applications in bioinformatics, database engineering, and digital processing exist. Building on earlier work by Klarqvist et al., we show how positional population counts can be rapidly computed ...
Robert Clausecker   +2 more
wiley   +1 more source

A novel, efficient CNTFET Galois design as a basic ternary-valued logic field

open access: yesNanotechnology, Science and Applications, 2012
Peiman Keshavarzian1, Mahla Mohammad Mirzaee21Kerman Branch, Computer Engineering Department, Islamic Azad University, Kerman, Iran; 2Science and Research Branch, Computer Engineering Department, IA University, Kerman, IranAbstract: This paper presents ...
Keshavarzian P, Mirzaee MM
doaj  

Nontriviality of rings of integral‐valued polynomials

open access: yesMathematische Nachrichten, Volume 298, Issue 12, Page 3974-3994, December 2025.
Abstract Let S$S$ be a subset of Z¯$\overline{\mathbb {Z}}$, the ring of all algebraic integers. A polynomial f∈Q[X]$f \in \mathbb {Q}[X]$ is said to be integral‐valued on S$S$ if f(s)∈Z¯$f(s) \in \overline{\mathbb {Z}}$ for all s∈S$s \in S$. The set IntQ(S,Z¯)${\mathrm{Int}}_{\mathbb{Q}}(S,\bar{\mathbb{Z}})$ of all integral‐valued polynomials on S$S ...
Giulio Peruginelli, Nicholas J. Werner
wiley   +1 more source

Home - About - Disclaimer - Privacy