Browsing Fakultät für Mathematik und Informatik (inkl. GAUSS) by Title
Now showing items 508-527 of 548
-
The split prime μ-conjecture and further topics in Iwasawa theory
(2019-03-25)The thesis is divided in three independent chapters, each focused on a different problem in Iwasawa theory. In Chapter 1 we prove the split prime μ-conjecture for abelian extensions of imaginary quadratic fields. In Chapter ... -
Theory and Numerics for Shape Optimization in Superconductivity
(2006-09-18)We consider a mathematical model for a thin superconducting film which is magnetically shielded by permanent magnets in order to improve the current carrying capability of the film. In a ... -
Thetafunktionen und konjugationsinvariante Funktionen auf Paaren von Matrizen
(2009-01-16)We express conjugation-invariant functions on the space of equivalence classes of pairs of kxk matrices via theta functions. Our approach is based on the well-known interplay between algebraic ... -
Topological construction of C*-correspondences for groupoid C*-algebras
(2015-09-09)Let G and H be locally compact, Hausdor groupoids with Haar systems. We de fine a topological correspondence from G to H to be a G-H bispace X carrying a G-quasi invariant and H-invariant family of measures. We show that ... -
Topological Invariants for Non-Archimedean Bornological Algebras
(2020-10-13)In this thesis, we define a cyclic homology theory for non-archimedean bornological algebras, which we call analytic cyclic homology. Let V be a complete, discrete valuation ring with uniformiser p, residue field k, and ... -
Toward Trustworthiness of Deep Learning Models for 12-Lead ECGs
(2024-01-31)A 12-lead electrocardiogram (ECG), a common examination tool in cardiology, represents the electrical activity of the heart as waveforms. Predictions and classifications with deep learning (DL) algorithms show great potential ... -
Towards a Lightweight, Secure, and Untraceable RFID Authentication Protocol
(2015-09-11)This dissertation tackles the problem of user privacy and security of transactions in the authentication protocols of the technology of Radio-frequency identification (RFID). Radio-frequency identification is ubiquitously ... -
Towards a Robust and Secure Decentralized Online Social Network
(2015-01-15)The virtually unlimited growth of popular Online Social Networks (OSNs) is often accompanied by severe violations of their users' privacy and intellectual property rights. Both problems are rooted in the centralized ... -
Towards Personalized Cardiac Modeling of Failing Heart with Engineered Heart Muscle
(2024-05-28)This dissertation investigates the biomechanics of the left ventricle across multiple geometric levels toward personalized cardiac modeling with engineered heart muscle. Firstly, a physics-based model for the EDPVR and ... -
Towards Rigorous Agent-Based Modelling
(2015-01-07)Agent- or individual-based modelling is a modelling approach where the heterogeneity of entities, i.e. agents, matters. In the past ten to twenty years agent-based models became increasingly popular and were applied in ... -
Tracking and Fusion Methods for Extended Targets Parameterized by Center, Orientation, and Semi-axes
(2022-01-14)The improvements in sensor technology, e.g., the development of automotive Radio Detection and Ranging (RADAR) or Light Detection and Ranging (LIDAR), which are able to provide a higher detail of the sensor’s environment, ... -
Triadic Closure and Its Influence in Social Networks
(2016-09-12)Social triad—a group of three people—is one of the simplest and most fundamental social groups, which serves as the basis of social network analysis. Triadic closure, a closing process of an open triad, is a useful ... -
Twisted equivariant K-theory and equivariant T-duality
(2023-09-18)This thesis is about two things: twisted equivariant K-theory and equivariant topological T-duality. First, we prove a fixed point decomposition theorem for twisted equivariant K-theory, generalising a result of Atiyah and ... -
Twisted K-theory with coefficients in a C*-algebra and obstructions against positive scalar curvature metrics
(2010-03-17)We introduce the notion of twisted Hilbert A-module bundles to construct a geometric realization of twisted K-theory with coefficients in a C*-algebra A. Like ordinary bundles of Hilbert ... -
Twisted Kloosterman sums and cubic exponential sums
(2009-12-15)In this thesis work, we study the problem of the distribution of cubic exponential sums. Using the theory of of automorphic forms, we are able to determine the asymptotic behavior of these ... -
Two Cases of Artin's Conjecture
(2021-02-25)Let $f_1, \dots, f_R$ be forms of degree $k_1, \dots, k_R$ in $s$ variables. A generalised version of a conjecture by Artin states that the equations $f_1= \dots=f_R=0$ have a non-trivial $p$-adic solution for all primes ... -
UML Profile for Communicating Systems
(2007-04-24)This thesis presents a new Unified Modeling Language 2 (UML) profile for communicating systems. It is developed for the unambiguous, executable specification and description of communication ... -
UML-based Test Specification for Communication Systems
(2004-10-28)Nowadays, the complexity of modern telecommunication systems has increased significantly and the requirement for thorough and systematic testing is undisputed. The TTCN-3 is an universal ... -
Universal Coefficient Theorems in Equivariant KK-theory
(2011-02-21)We prove a universal coefficient theorem for C*-algebras acted upon by a group of prime power order. In this context, we define an extension of equivariant K-theory and prove the existence ... -
Universal Workload-based Graph Partitioning and Storage Adaption for Distributed RDF Stores
(2021-01-06)The publication of machine-readable information has been significantly increasing both in the magnitude and complexity of the embedded relations. The Resource Description Framework(RDF) plays a big role in modeling and ...