Hole operations on Hurwitz maps

نویسندگان

چکیده

For a given group G the orientably regular maps with orientation-preserving automorphism are used as vertices of graph O(G), undirected and directed edges showing effect duality hole operations on these maps. Some examples graphs given, including several for small Hurwitz groups. some G, such affine groups AGL1(2e), O(G) is connected, whereas other infinite families, alternating symmetric groups, number connected components unbounded.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stable Maps and Hurwitz Schemes in Mixed Characteristic

The Hurwitz scheme was originally conceived as a parameter space for simply branched covers of the projective line. A variant of this is a parameter spaec for simply branched covers of the projective line, up to automorphisms of P the so called unparametrized Hurwitz scheme. Other variants involve fixing branching types which are not necessarily simple (see [D-D-H]). A rigorous algebraic defini...

متن کامل

On Operations Preserving Primitivity of Partial Words with One Hole

The notion of a primitive word, one that is not a power of another word, is useful in many areas including coding theory, combinatorics on words, formal language theory, and text algorithms. The proportion of such words turns out to be very high. We investigate operations that preserve the primitivity of partial words with one hole, or words that have an undefined position. As a result, all pri...

متن کامل

On Robust Hurwitz Polynomials

In this note, Kharitonov's theorem on robust Hunvitz poljmomials is simplified for low-order polynomials. Specifically, for n = 3, 4, and 5, the number of polynomials required to check robust stability is one, two, and three, respectively, instead of four. Furthermore, it is shown that for n > 6, the number of polynomials for robust stability checking is necessarily four, thus further simplific...

متن کامل

study of hash functions based on chaotic maps

توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...

On Hurwitz Transformations

Paper published in the proceedings of the workshop " Leprobì eme de factorisation de Hur-ABSTRACT A bibliography on the Hurwitz transformations is given. We deal here, with some details, with two particular Hurwitz transformations, viz, the R 4 → R 3 Kustaanheimo-Stiefel transformation and its R 8 → R 5 compact extension. These transformations are derived in the context of Fock-Bargmann-Schwing...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The art of discrete and applied mathematics

سال: 2022

ISSN: ['2590-9770']

DOI: https://doi.org/10.26493/2590-9770.1531.46a