25 research outputs found

    Counting supercuspidal representations of p-adic groups

    Get PDF
    Let F be a non-archimedean local �eld with residual characteristic p ~= 2. In this thesis we will deduce a formula for the number of irreducible supercuspidal representations of GLN(F), N C 1, with !�($F ) = 1 and level less than or equal to k. Following Blasco, we construct all irreducible supercuspidal representations of the unitary groups U(1; 1)(F~F0) and U(2; 1)(F~F0) by looking at their characteristic polynomials and then compute the number of all these representations according to their level

    Eisenstein field BCH codes construction and decoding

    Get PDF
    First, we will go through the theory behind the Eisenstein field (EF) and its extension field. In contrast, we provide a detailed framework for building BCH codes over the EF in the second stage. BCH codes over the EF are decoded using the Berlekamp-Massey algorithm (BMA) in this article. We investigate the error-correcting capabilities of these codes and provide expressions for minimal distance. We provide researchers and engineers creating and implementing robust error-correcting codes for digital communication systems with detailed information on building, decoding and performance assessment

    Intuitionistic fuzzy k-ideals of right k-weakly regular hemirings

    Get PDF
    In this work, we will examine the concept of intuitionistic fuzzy k-ideals in the context of right k-weakly regular hemirings. We will investigate the properties of these ideals and how they relate to other concepts such as fuzzy prime k-ideals, intuitionistic fuzzy prime k-ideals, intuitionistic fuzzy right pure k-ideals, and purely prime intuitionistic fuzzy k-ideals in hemirings. We will also explore how the regularity of a k-weakly regular hemiring can be characterized through its intuitionistic fuzzy k-ideals

    Generalization of RSA cryptosystem based on 2n primes

    Get PDF
    This article introduced a new generalized RSA crypto-system based on 2n 2n prime numbers called generalized RSA (GRSA). This is a modern technique to provide supreme security for the computer world by factoring the variableN N , where its analysis process has become much easier nowadays with the development of tools and equipment. 2n 2n primes (prime numbers) are used in the GRSA crypto-system to provide security over the network system. This includes encryption, key generation, and decryption. In this method we used 2n 2n primes which are not easily broken, 2n 2n primes are not comfortably demented. This method provides greater performance and fidelity over the network system

    A decision-making framework based on the Fermatean hesitant fuzzy distance measure and TOPSIS

    Get PDF
    A particularly useful assessment tool for evaluating uncertainty and dealing with fuzziness is the Fermatean fuzzy set (FFS), which expands the membership and non-membership degree requirements. Distance measurement has been extensively employed in several fields as an essential approach that may successfully disclose the differences between fuzzy sets. In this article, we discuss various novel distance measures in Fermatean hesitant fuzzy environments as research on distance measures for FFS is in its early stages. These new distance measures include weighted distance measures and ordered weighted distance measures. This justification serves as the foundation for the construction of the generalized Fermatean hesitation fuzzy hybrid weighted distance (DGFHFHWD) scale, as well as the discussion of its weight determination mechanism, associated attributes and special forms. Subsequently, we present a new decision-making approach based on DGFHFHWD and TOPSIS, where the weights are processed by exponential entropy and normal distribution weighting, for the multi-attribute decision-making (MADM) issue with unknown attribute weights. Finally, a numerical example of choosing a logistics transfer station and a comparative study with other approaches based on current operators and FFS distance measurements are used to demonstrate the viability and logic of the suggested method. The findings illustrate the ability of the suggested MADM technique to completely present the decision data, enhance the accuracy of decision outcomes and prevent information loss

    Quantum corrected charged thin-shell wormholes surrounded by quintessence

    No full text
    Abstract In this manuscript, we inspect the stable geometry of thin-shell wormholes in the framework of static, spherically-symmetric quantum corrected charged black hole solution bounded by quintessence. In this regard, we develop thin-shell wormholes from two equivalent copies of black hole solutions through the cut and paste approach. Then, we employ the linearized radial perturbation to discuss the stability of the developed wormhole geometry by assuming variable equations of state. We obtain the maximum stable configuration for massive black holes for both barotropic and Chaplygin variables equations of state. It is found that the quantum correction affects the stability of thin-shell wormholes and the presence of charge over the geometry of black holes enhances the stable configuration of thin-shell wormholes

    A Novel Concept of Complex Anti-Fuzzy Isomorphism over Groups

    No full text
    In this research article, the fundamental properties of complex anti-fuzzy subgroups as well as the influence of group homomorphisms on their characteristics are investigated. Both the necessary and sufficient conditions for a complex anti-fuzzy subgroup are defined; additionally, the image, inverse image and some vital primary features of complex anti-fuzzy subgroups are examined. Moreover, the homomorphic and isomorphic relations of complex anti-fuzzy subgroups under group homomorphism are discussed, and numerical examples for various scenarios to describe complex anti-fuzzy symmetric groups are provided. Finally, it is proven that every homomorphic image of a complex anti-fuzzy cyclic group is cyclic, but the converse may not be true

    Analytical solutions of spherical structures with relativistic corrections

    No full text
    Abstract This paper analyzes the characteristic of a non-static sphere along with anisotropic fluid distribution in the background of modified f(G)f(\mathcal {G}) f ( G ) theory. Conformal Killing vector is a productive constraint for computing reliable results for modified field equations. The occurrence of conformal Killing vector indicates the existence of symmetries in spacetime and it permits us to choose the coordinates that reduce the number of independent variables. Subsequently, for different conformal Killing vector choices, we obtain several types of precise analytical solutions for both non-dissipative and dissipative systems. We compute the matching conditions in the context of f(G)f(\mathcal {G}) f ( G ) gravity. In addition to this, we apply specific constraints to the matching conditions in an attempt to determine the significant results. Further, we proceed our investigation by utilizing quasi-homologous condition and vanishing complexity factor condition. Finally, we summarize all the important results which may help to understand the properties of astrophysical objects

    MHD Free Convection Flows for Maxwell Fluids over a Porous Plate via Novel Approach of Caputo Fractional Model

    No full text
    The ultimate goal of the article is the analysis of free convective flow of an MHD Maxwell fluid over a porous plate. The study focuses on understanding the dynamics of fluid flow over a moving plate in the presence of a magnetic field, where the magnetic lines of force can either be stationary or in motion along the plate. Further, we will investigate the heat and mass transfer characteristics of the system under specific conditions: constant species and thermal conductivity as functions of time. The study involves a symmetric temperature distribution that provides heat on both sides of the plane. Our analysis includes the study of the model for different instances of plate motion and variations in temperature. The fluid dynamics of the system are mathematically described using a system of fractional-order partial differential equations. To make the model independent of geometric units, dimensionless variables are introduced. Moreover, we employ the concept of fractional-order derivative operators in the sense of Caputo, which introduces a fractional dimension to the equations. Additionally, the integral Laplace transform and numerical algorithms are utilized to solve the problem. Finally, by using graphical analysis the contribution of physical parameters on the fluid dynamics is discussed and valuable findings are documented

    The Effects of Thermal Memory on a Transient MHD Buoyancy-Driven Flow in a Rectangular Channel with Permeable Walls: A Free Convection Flow with a Fractional Thermal Flux

    No full text
    This study investigates the effects of magnetic induction, ion slip and Hall current on the flow of linear viscous fluids in a rectangular buoyant channel. In a hydro-magnetic flow scenario with permeable and conducting walls, one wall has a temperature variation that changes over time, while the other wall keeps a constant temperature; the research focuses on this situation. Asymmetric wall heating and suction/injection effects are also examined in the study. Using the Laplace transform, analytical solutions in the Laplace domain for temperature, velocity and induced magnetic field have been determined. The Stehfest approach has been used to find numerical solutions in the real domain by reversing Laplace transforms. The generalized thermal process makes use of an original fractional constitutive equation, in which the thermal flux is influenced by the history of temperature gradients, which has an impact on both the thermal process and the fluid’s hydro-magnetic behavior. The influence of thermal memory on heat transfer, fluid movement and magnetic induction was highlighted by comparing the solutions of the fractional model with the classic one based on Fourier’s law
    corecore