Infinite-Order Differential Operators Acting On Entire Hyperholomorphic Functions,
2021
Chapman University
Infinite-Order Differential Operators Acting On Entire Hyperholomorphic Functions, Daniel Alpay, Fabrizio Colombo, Stefano Pinton, Irene Sabadini, Daniele C. Struppa
Mathematics, Physics, and Computer Science Faculty Articles and Research
Infinite-order differential operators appear in different fields of mathematics and physics and in the past decade they turned out to be of fundamental importance in the study of the evolution of superoscillations as initial datum for Schrödinger equation. Inspired by the operators arising in quantum mechanics, in this paper, we investigate the continuity of a class of infinite-order differential operators acting on spaces of entire hyperholomorphic functions. We will consider two classes of hyperholomorphic functions, both being natural extensions of holomorphic functions of one complex variable. We show that, even though these two notions of hyperholomorphic functions are quite different …
A Tropical Approach To The Brill-Noether Theory Over Hurwitz Spaces,
2021
University of Kentucky
A Tropical Approach To The Brill-Noether Theory Over Hurwitz Spaces, Kaelin Cook-Powell
Theses and Dissertations--Mathematics
The geometry of a curve can be analyzed in many ways. One way of doing this is to study the set of all divisors on a curve of prescribed rank and degree, known as a Brill-Noether variety. A sequence of results, starting in the 1980s, answered several fundamental questions about these varieties for general curves. However, many of these questions are still unanswered if we restrict to special families of curves. This dissertation has three main goals. First, we examine Brill-Noether varieties for these special families and provide combinatorial descriptions of their irreducible components. Second, we provide a natural generalization …
On The Tropicalization Of Lines Onto Tropical Quadrics,
2021
Harvey Mudd College
On The Tropicalization Of Lines Onto Tropical Quadrics, Natasha Crepeau
HMC Senior Theses
Tropical geometry uses the minimum and addition operations to consider tropical versions of the curves, surfaces, and more generally the zero set of polynomials, called varieties, that are the objects of study in classical algebraic geometry. One known result in classical geometry is that smooth quadric surfaces in three-dimensional projective space, $\mathbb{P}^3$, are doubly ruled, and those rulings form a disjoint union of conics in $\mathbb{P}^5$. We wish to see if the same result holds for smooth tropical quadrics. We use the Fundamental Theorem of Tropical Algebraic Geometry to outline an approach to studying how lines lift onto a tropical …
Towards Tropical Psi Classes,
2021
Claremont Colleges
Towards Tropical Psi Classes, Jawahar Madan
HMC Senior Theses
To help the interested reader get their initial bearings, I present a survey of prerequisite topics for understanding the budding field of tropical Gromov-Witten theory. These include the language and methods of enumerative geometry, an introduction to tropical geometry and its relation to classical geometry, an exposition of toric varieties and their correspondence to polyhedral fans, an intuitive picture of bundles and Euler classes, and finally an introduction to the moduli spaces of n-pointed stable rational curves and their tropical counterparts.
So How Were The Tents Of Israel Placed? A Bible-Inspired Geometric Problem,
2020
The University of Texas at El Paso
So How Were The Tents Of Israel Placed? A Bible-Inspired Geometric Problem, Julio Urenda, Olga Kosheleva, Vladik Kreinovich
Departmental Technical Reports (CS)
In one of the Biblical stories, prophet Balaam blesses the tents of Israel for being good. But what can be so good about the tents? A traditional Rabbinical interpretation is that the placement of the tents provided full privacy: from each entrance, one could not see what is happening at any other entrance. This motivates a natural geometric question: how exactly were these tents placed? In this paper, we provide an answer to this question.
Introduce Gâteaux And Frêchet Derivatives In Riesz Spaces,
2020
Mus Alparslan University
Introduce Gâteaux And Frêchet Derivatives In Riesz Spaces, Abdullah Aydın, Erdal Korkmaz
Applications and Applied Mathematics: An International Journal (AAM)
In this paper, the Gâteaux and Frêchet differentiations of functions on Riesz space are introduced without topological structure. Thus, we aim to study Gâteaux and Frêchet differentiability functions in vector lattice by developing topology-free techniques, and also, we give some relations with other kinds of operators.
Sum Of Cubes Of The First N Integers,
2020
California State University, San Bernardino
Sum Of Cubes Of The First N Integers, Obiamaka L. Agu
Electronic Theses, Projects, and Dissertations
In Calculus we learned that Sum^{n}_{k=1} k = [n(n+1)]/2 , that Sum^{n}_{k=1} k^2 = [n(n+1)(2n+1)]/6 , and that Sum^{n}_{k=1} k^{3} = (n(n+1)/2)^{2}. These formulas are useful when solving for the area below quadratic or cubic function over an interval [a, b]. This tedious process, solving for areas under a quadratic or a cubic, served as motivation for the introduction of Riemman integrals. For the overzealous math student, these steps were replaced by a simpler method of evaluating antiderivatives at the endpoints a and b. From my recollection, a former instructor informed us to do the value of memorizing these formulas. …
Estimating The Number Of Discrete Models Of Biological Networks,
2020
Southern Methodist University
Estimating The Number Of Discrete Models Of Biological Networks, Brandilyn Stigler
Annual Symposium on Biomathematics and Ecology Education and Research
No abstract provided.
Application Of Tda Mapper To Water Data And Bird Data,
2020
University of Wisconsin - La Crosse
Application Of Tda Mapper To Water Data And Bird Data, Wako Bungula
Annual Symposium on Biomathematics and Ecology Education and Research
No abstract provided.
Weaving Mathematics,
2020
Ateneo de Manila University
Weaving Mathematics, Ma. Louise Antonette N. De Las Peñas
Magisterial Lectures
In this lecture, Dr. De las Peñas talks about the intersection of mathematics and Philippine indigenous weaving.
Speaker:
Ma. Louise Antonette N. De Las Peñas is a Professor at the Department of Mathematics and currently the Associate Dean for Research and Creative Work, Loyola Schools, Ateneo De Manila University, Philippines. Her research interests are discrete geometry, mathematical crystallography, group theory, and technology in mathematics education.
She is a recipient of several research awards including the National Research Council of the Philippines (NRCP) Achievement Award in the Mathematical Sciences and the Philippine Commission on Higher Education Republica National Research Award. She …
Dupin Submanifolds In Lie Sphere Geometry (Updated Version),
2020
College of the Holy Cross
Dupin Submanifolds In Lie Sphere Geometry (Updated Version), Thomas E. Cecil, Shiing-Shen Chern
Mathematics Department Faculty Scholarship
A hypersurface Mn-1 in Euclidean space En is proper Dupin if the number of distinct principal curvatures is constant on Mn-1, and each principal curvature function is constant along each leaf of its principal foliation. This paper was originally published in 1989 (see Comments below), and it develops a method for the local study of proper Dupin hypersurfaces in the context of Lie sphere geometry using moving frames. This method has been effective in obtaining several classification theorems of proper Dupin hypersurfaces since that time. This updated version of the paper contains the original exposition together …
Intrinsic Curvature For Schemes,
2020
University of New Mexico - Main Campus
Intrinsic Curvature For Schemes, Pat Lank
Mathematics & Statistics ETDs
This thesis develops an algebraic analog of psuedo-Riemannian geometry for relative schemes whose cotangent sheaf is finite locally free. It is a generalization of the algebraic differential calculus proposed by Dr. Ernst Kunz in an unpublished manuscript to the non-affine case. These analogs include the psuedo-Riemannian metric, Levi-Civit´a connection, curvature, and various existence theorems.
Topological And H^Q Equivalence Of Cyclic N-Gonal Actions On Riemann Surfaces - Part Ii,
2020
Rose-Hulman Institute of Technology
Topological And H^Q Equivalence Of Cyclic N-Gonal Actions On Riemann Surfaces - Part Ii, Sean A. Broughton
Mathematical Sciences Technical Reports (MSTR)
We consider conformal actions of the finite group G on a closed Riemann surface S, as well as algebraic actions of G on smooth, complete, algebraic curves over an arbitrary, algebraically closed field. There are several notions of equivalence of actions, the most studied of which is topological equivalence, because of its close relationship to the branch locus of moduli space. A second important equivalence relation is that induced by representation of G on spaces of holomorphic q-differentials. The notion of topological equivalence does not work well in positive characteristic. We shall discuss an alternative to topological equivalence, …
Numerical Computations Of Vortex Formation Length In Flow Past An Elliptical Cylinder,
2020
University of Pittsburgh
Numerical Computations Of Vortex Formation Length In Flow Past An Elliptical Cylinder, Matthew Karlson, Bogdan Nita, Ashwin Vaidya
Department of Mathematics Facuty Scholarship and Creative Works
We examine two dimensional properties of vortex shedding past elliptical cylinders through numerical simulations. Specifically, we investigate the vortex formation length in the Reynolds number regime 10 to 100 for elliptical bodies of aspect ratio in the range 0.4 to 1.4. Our computations reveal that in the steady flow regime, the change in the vortex length follows a linear profile with respect to the Reynolds number, while in the unsteady regime, the time averaged vortex length decreases in an exponential manner with increasing Reynolds number. The transition in profile is used to identify the critical Reynolds number which marks the …
Spectral Sequences For Almost Complex Manifolds,
2020
The Graduate Center, City University of New York
Spectral Sequences For Almost Complex Manifolds, Qian Chen
Dissertations, Theses, and Capstone Projects
In recent work, two new cohomologies were introduced for almost complex manifolds: the so-called J-cohomology and N-cohomology [CKT17]. For the case of integrable (complex) structures, the former cohomology was already considered in [DGMS75], and the latter agrees with de Rham cohomology. In this dissertation, using ideas from [CW18], we introduce spectral sequences for these two cohomologies, showing the two cohomologies have natural bigradings. We show the spectral sequence for the J-cohomology converges at the second page whenever the almost complex structure is integrable, and explain how both fit in a natural diagram involving Bott-Chern cohomology and the Frolicher spectral sequence. …
The Künneth Formula And Applications,
2020
Chapman University
The Künneth Formula And Applications, Melissa Sugimoto
SURF Posters and Papers
The de Rham cohomology of a manifold is a homotopy invariant that expresses basic topological information about smooth manifolds. The q-th de Rham cohomology of the n-dimensional Euclidean space is the vector space defined by the closed q-forms over the exact q-forms. Furthermore, the support of a continuous function f on a topological space X is the closure of the set on which f is nonzero. The result of restricting the definition of the de Rham cohomology to functions with compact support is called the de Rham cohomology with compact support, or the compact cohomology. The concept of cohomology can …
Analyzing Network Topology For Ddos Mitigation Using The Abelian Sandpile Model,
2020
Reed College
Analyzing Network Topology For Ddos Mitigation Using The Abelian Sandpile Model, Bhavana Panchumarthi, Monroe Ame Stephenson
altREU Projects
A Distributed Denial of Service (DDoS) is a cyber attack, which is capable of triggering a cascading failure in the victim network. While DDoS attacks come in different forms, their general goal is to make a network's service unavailable to its users. A common, but risky, countermeasure is to blackhole or null route the source, or the attacked destination. When a server becomes a blackhole, or referred to as the sink in the paper, the data that is assigned to it "disappears" or gets deleted. Our research shows how mathematical modeling can propose an alternative blackholing strategy that could improve …
Harmony Amid Chaos,
2020
Olivet Nazarene University
Harmony Amid Chaos, Drew Schaffner
Pence-Boyce STEM Student Scholarship
We provide a brief but intuitive study on the subjects from which Galois Fields have emerged and split our study up into two categories: harmony and chaos. Specifically, we study finite fields with elements where is prime. Such a finite field can be defined through a logarithm table. The Harmony Section is where we provide three proofs about the overall symmetry and structure of the Galois Field as well as several observations about the order within a given table. In the Chaos Section we make two attempts to analyze the tables, the first by methods used by Vladimir Arnold as …
A Differential-Algebraic Criterion For Obtaining A Small Maximal Cohen-Macaulay Module,
2020
CUNY New York City College of Technology
A Differential-Algebraic Criterion For Obtaining A Small Maximal Cohen-Macaulay Module, Hans Schoutens
Publications and Research
We show how for a three-dimensional complete local ring in positive characteristic, the existence of an F-invariant, differentiable derivation implies Hochster’s small MCM conjecture. As an application we show that any three-dimensional pseudo-graded ring in positive characteristic satisfies Hochster’s small MCM conjecture.
Multiparty Non-Interactive Key Exchange And More From Isogenies On Elliptic Curves,
2020
Stanford University
Multiparty Non-Interactive Key Exchange And More From Isogenies On Elliptic Curves, Dan Boneh, Darren B. Glass, Daniel Krashen, Kristin Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry
Math Faculty Publications
We describe a framework for constructing an efficient non-interactive key exchange (NIKE) protocol for n parties for any n ≥ 2. Our approach is based on the problem of computing isogenies between isogenous elliptic curves, which is believed to be difficult. We do not obtain a working protocol because of a missing step that is currently an open mathematical problem. What we need to complete our protocol is an efficient algorithm that takes as input an abelian variety presented as a product of isogenous elliptic curves, and outputs an isomorphism invariant of the abelian variety.
Our framework builds a cryptographic …