Open Access. Powered by Scholars. Published by Universities.®

Number Theory Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Number Theory

The Examination Of The Arithmetic Surface (3, 5) Over Q, Rachel J. Arguelles May 2022

The Examination Of The Arithmetic Surface (3, 5) Over Q, Rachel J. Arguelles

Electronic Theses, Projects, and Dissertations

This thesis is centered around the construction and analysis of the principal arithmetic surface (3, 5) over Q. By adjoining the two symbols i,j, where i2 = 3, j2 = 5, such that ij = -ji, I can produce a quaternion algebra over Q. I use this quaternion algebra to find a discrete subgroup of SL2(R), which I identify with isometries of the hyperbolic plane. From this quaternion algebra, I produce a large list of matrices and apply them via Mobius transformations to the point (0, 2), which is the center of my Dirichlet domain. This …


Symmetric Presentations Of Finite Groups And Related Topics, Samar Mikhail Kasouha May 2022

Symmetric Presentations Of Finite Groups And Related Topics, Samar Mikhail Kasouha

Electronic Theses, Projects, and Dissertations

A progenitor is an infinite semi-direct product of the form m∗n : N, where N ≤ Sn and m∗n : N is a free product of n copies of a cyclic group of order m. A progenitor of this type, in particular 2∗n : N, gives finite non-abelian simple groups and groups involving these, including alternating groups, classical groups, and the sporadic group. We have conducted a systematic search of finite homomorphic images of numerous progenitors. In this thesis we have presented original symmetric presentations of the sporadic simple groups, M12, J1 as homomorphic images of the progenitor 2∗12 : …


A Study In Applications Of Continued Fractions, Karen Lynn Parrish Dec 2021

A Study In Applications Of Continued Fractions, Karen Lynn Parrish

Electronic Theses, Projects, and Dissertations

This is an expository study of continued fractions collecting ideas from several different sources including textbooks and journal articles. This study focuses on several applications of continued fractions from a variety of levels and fields of mathematics. Studies begin with looking at a number of properties that pertain to continued fractions and then move on to show how applications of continued fractions is relevant to high school level mathematics including approximating irrational numbers and developing new ideas for understanding and solving quadratics equations. Focus then continues to more advanced applications such as those used in the studies of number theory …


Sum Of Cubes Of The First N Integers, Obiamaka L. Agu Dec 2020

Sum Of Cubes Of The First N Integers, Obiamaka L. Agu

Electronic Theses, Projects, and Dissertations

In Calculus we learned that 􏰅Sum^{n}_{k=1} k = [n(n+1)]/2 , that Sum^{􏰅n}_{k=1} k^2 = [n(n+1)(2n+1)]/6 , and that Sum^{n}_{k=1} k^{3} = (n(n+1)/2)^{2}. These formulas are useful when solving for the area below quadratic or cubic function over an interval [a, b]. This tedious process, solving for areas under a quadratic or a cubic, served as motivation for the introduction of Riemman integrals. For the overzealous math student, these steps were replaced by a simpler method of evaluating antiderivatives at the endpoints a and b. From my recollection, a former instructor informed us to do the value of memorizing these formulas. …


Symmetric Presentations And Related Topics, Mayra Mcgrath Mar 2020

Symmetric Presentations And Related Topics, Mayra Mcgrath

Electronic Theses, Projects, and Dissertations

In this thesis, we have investigated several permutation and monomialprogenitors for finite images. We have found original symmetric presen-tations for several important non-abelian simple groups, including lineargroups, unitary groups, alternating groups, and sporadic simple groups.We have found a number of finite images, including : L(2,41), PSL(2,11)×2, L(2,8), and L(2,19), as homomorphic images of the permutation progenitors. We have also found PGL(2,16) : 2 =Aut(PSL(2,16)) and PSL(2,16) as homomorphic images of monomial progenitors. We have performed manual double coset enumeration of finte images. In addition, we have given the isomorphism class of each image that we have discovered. Presentation for all …


Modern Cryptography, Samuel Lopez Jun 2018

Modern Cryptography, Samuel Lopez

Electronic Theses, Projects, and Dissertations

We live in an age where we willingly provide our social security number, credit card information, home address and countless other sensitive information over the Internet. Whether you are buying a phone case from Amazon, sending in an on-line job application, or logging into your on-line bank account, you trust that the sensitive data you enter is secure. As our technology and computing power become more sophisticated, so do the tools used by potential hackers to our information. In this paper, the underlying mathematics within ciphers will be looked at to understand the security of modern ciphers.

An extremely important …


Monomial Progenitors And Related Topics, Madai Obaid Alnominy Mar 2018

Monomial Progenitors And Related Topics, Madai Obaid Alnominy

Electronic Theses, Projects, and Dissertations

The main objective of this project is to find the original symmetric presentations of some very important finite groups and to give our constructions of some of these groups. We have found the Mathieu sporadic group M11, HS × D5, where HS is the sporadic group Higman-Sim group, the projective special unitary group U(3; 5) and the projective special linear group L2(149) as homomorphic images of the monomial progenitors 11*4 :m (5 :4), 5*6 :m S5 and 149*2 :m D37. We have also discovered 2 …


The Evolution Of Cryptology, Gwendolyn Rae Souza Jun 2016

The Evolution Of Cryptology, Gwendolyn Rae Souza

Electronic Theses, Projects, and Dissertations

We live in an age when our most private information is becoming exceedingly difficult to keep private. Cryptology allows for the creation of encryptive barriers that protect this information. Though the information is protected, it is not entirely inaccessible. A recipient may be able to access the information by decoding the message. This possible threat has encouraged cryptologists to evolve and complicate their encrypting methods so that future information can remain safe and become more difficult to decode. There are various methods of encryption that demonstrate how cryptology continues to evolve through time. These methods revolve around different areas of …


Mathematical Reasoning And The Inductive Process: An Examination Of The Law Of Quadratic Reciprocity, Nitish Mittal Jun 2016

Mathematical Reasoning And The Inductive Process: An Examination Of The Law Of Quadratic Reciprocity, Nitish Mittal

Electronic Theses, Projects, and Dissertations

This project investigates the development of four different proofs of the law of quadratic reciprocity, in order to study the critical reasoning process that drives discovery in mathematics. We begin with an examination of the first proof of this law given by Gauss. We then describe Gauss’ fourth proof of this law based on Gauss sums, followed by a look at Eisenstein’s geometric simplification of Gauss’ third proof. Finally, we finish with an examination of one of the modern proofs of this theorem published in 1991 by Rousseau. Through this investigation we aim to analyze the different strategies used in …


Unique Prime Factorization Of Ideals In The Ring Of Algebraic Integers Of An Imaginary Quadratic Number Field, Nolberto Rezola Jun 2015

Unique Prime Factorization Of Ideals In The Ring Of Algebraic Integers Of An Imaginary Quadratic Number Field, Nolberto Rezola

Electronic Theses, Projects, and Dissertations

The ring of integers is a very interesting ring, it has the amazing property that each of its elements may be expressed uniquely, up to order, as a product of prime elements. Unfortunately, not every ring possesses this property for its elements. The work of mathematicians like Kummer and Dedekind lead to the study of a special type of ring, which we now call a Dedekind domain, where even though unique prime factorization of elements may fail, the ideals of a Dedekind domain still enjoy the property of unique prime factorization into a product of prime ideals, up to order …


A Fundamental Unit Of O_K, Susana L. Munoz Mar 2015

A Fundamental Unit Of O_K, Susana L. Munoz

Electronic Theses, Projects, and Dissertations

In the classical case we make use of Pells equation to compute units in the ring OF. Consider the parallel to the classical case and the quadratic field extension that creates the ring OK. We use the generalized Pell's equation to find the units in this ring since they are solutions. Through the use of continued fractions we may further characterize this ring and compute its units.