Cat. A2

Designing Pair of Nonlinear Components of a Block Cipher over Gaussian Integers

In block ciphers, the nonlinear components, also known as sub- stitution boxes (S-boxes), are used with the purpose of inducing confusion in cryptosystems. For the last decade, most of the work on designing S-boxes over the points of elliptic curves …

Mitigación de la violencia rural en Santander-Colombia: Una estrategia para menguar la agresión escolar

La violencia es un flagelo social que campea por todos los escenarios y se requieren esfuerzos multilaterales y variadas estrategias para combatirla. El objetivo de este trabajo investigativo fue aplicar una estrategia de juegos cooperativos para …

Global Solutions to a Hydrodynamic Model for Semiconductors with Velocity Relaxation

In this paper, we apply the method given in the paper “Zero relaxation time limits to a hydrodynamic model of two carrier types for semiconductors” (Mathematische Annalen, 2022, 382: 1031–1046) to study the Cauchy problem for a one dimensional …

Relación entre clima organizacional y desempeño laboral: estudio focalizado en el laboratorio empresarial LAEMCO en Tunja (Colombia)

En este trabajo investigativo, se analiza la relación entre el clima organizacional y el desempeño laboral del personal que participa en las prácticas empresariales LAEMCO de la Facultad de Ciencias Administrativas y Económicas de la Universidad …

Fundamental Results of Cyclic Codes over Octonion Integers and Their Decoding Algorithm

Coding theory is the study of the properties of codes and their respective fitness for specific applications. Codes are used for data compression, cryptography, error detection, error correction, data transmission, and data storage. Codes are studied …

Cayley Hash Values of Brauer Messages and Some of Their Applications in the Solutions of Systems of Differential Equations

Cayley hash values are defined by paths of some oriented graphs (quivers) called Cayley graphs, whose vertices and arrows are given by elements of a group $\mathfrak{H}$. On the other hand, Brauer messages are obtained by concatenating words …

Snake Graphs Arising from Groves with an Application in Coding Theory

Snake graphs are connected planar graphs consisting of a finite sequence of adjacent tiles (squares) $T_1, T_2, \ldots,T_n$. In this case, for $1 \leq j \leq n-1$ , two consecutive tiles $T_j$ and $T_{j+1}$ share exactly one edge, either the edge at …

Local Well-Posedness to the Cauchy Problem for an Equation of the Nagumo Type

In this paper, we show the local well-posedness for the Cauchy problem for the equation of the Nagumo type in this equation (1) in the Sobolev spaces $H^s(\mathbb{R})$ . If $D0$, the local well-posedness is given for $s 1/2$ and for $s 3/2$ if …

Entropy, Feller Processes and $p$-Adic Analogues of the Scattering Equation

There are several techniques in the classical case for some integro-differential equations involving the concept of entropy to show some properties of the solution. In this work, we deal with the $p$-adic scattering equation. We adapt these methods …

On NI and NJ skew PBW extensions

We establish necessary or sufficient conditions to guarantee that skew Poincaré–Birkhoff–Witt extensions are NI or NJ rings. Our results extend those corresponding for skew polynomial rings and establish similar properties for other families of …