Hole operations on Hurwitz maps
نویسندگان
چکیده
For a given group G the orientably regular maps with orientation-preserving automorphism are used as vertices of graph O(G), undirected and directed edges showing effect duality hole operations on these maps. Some examples graphs given, including several for small Hurwitz groups. some G, such affine groups AGL1(2e), O(G) is connected, whereas other infinite families, alternating symmetric groups, number connected components unbounded.
منابع مشابه
Stable Maps and Hurwitz Schemes in Mixed Characteristic
The Hurwitz scheme was originally conceived as a parameter space for simply branched covers of the projective line. A variant of this is a parameter spaec for simply branched covers of the projective line, up to automorphisms of P the so called unparametrized Hurwitz scheme. Other variants involve fixing branching types which are not necessarily simple (see [D-D-H]). A rigorous algebraic defini...
متن کاملOn Operations Preserving Primitivity of Partial Words with One Hole
The notion of a primitive word, one that is not a power of another word, is useful in many areas including coding theory, combinatorics on words, formal language theory, and text algorithms. The proportion of such words turns out to be very high. We investigate operations that preserve the primitivity of partial words with one hole, or words that have an undefined position. As a result, all pri...
متن کاملOn Robust Hurwitz Polynomials
In this note, Kharitonov's theorem on robust Hunvitz poljmomials is simplified for low-order polynomials. Specifically, for n = 3, 4, and 5, the number of polynomials required to check robust stability is one, two, and three, respectively, instead of four. Furthermore, it is shown that for n > 6, the number of polynomials for robust stability checking is necessarily four, thus further simplific...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
On Hurwitz Transformations
Paper published in the proceedings of the workshop " Leprobì eme de factorisation de Hur-ABSTRACT A bibliography on the Hurwitz transformations is given. We deal here, with some details, with two particular Hurwitz transformations, viz, the R 4 → R 3 Kustaanheimo-Stiefel transformation and its R 8 → R 5 compact extension. These transformations are derived in the context of Fock-Bargmann-Schwing...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The art of discrete and applied mathematics
سال: 2022
ISSN: ['2590-9770']
DOI: https://doi.org/10.26493/2590-9770.1531.46a