The Primitive Topology of a Scheme
نویسندگان
چکیده
We de ne a Grothendieck topology on the category of schemes whose associated sheaf theory coincides in many cases with the Zariski topology. We also give some indications of possible advantages this new topology has over the Zariski topology.
منابع مشابه
A BINARY LEVEL SET METHOD FOR STRUCTURAL TOPOLOGY OPTIMIZATION
This paper proposes an effective algorithm based on the level set method (LSM) to solve shape and topology optimization problems. Since the conventional LSM has several limitations, a binary level set method (BLSM) is used instead. In the BLSM, the level set function can only take 1 and -1 values at convergence. Thus, it is related to phase-field methods. We don’t need to solve the Hamilton-Jac...
متن کاملA scheme over quasi-prime spectrum of modules
The notions of quasi-prime submodules and developed Zariski topology was introduced by the present authors in cite{ah10}. In this paper we use these notions to define a scheme. For an $R$-module $M$, let $X:={Qin qSpec(M) mid (Q:_R M)inSpec(R)}$. It is proved that $(X, mathcal{O}_X)$ is a locally ringed space. We study the morphism of locally ringed spaces induced by $R$-homomorphism $Mrightar...
متن کاملComparison of three different numerical schemes for 2D steady incompressible lid-driven cavity flow
In this study, a numerical solution of 2D steady incompressible lid-driven cavity flow is presented. Three different numerical schemes were employed to make a comparison on the practicality of the methods. An alternating direction implicit scheme for the vorticity-stream function formulation, explicit and implicit schemes for the primitive variable formulation of governing Navier-Stokes equatio...
متن کاملAn efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کاملA Deterministic Multiple Key Space Scheme for Wireless Sensor Networks via Combinatorial Designs
The establishing of a pairwise key between two nodes for encryption in a wireless sensor network is a challenging issue. To do this, we propose a new deterministic key pre-distribution scheme which has modified the multiple key space scheme (MKSS). In the MKSS, the authors define two random parameters to make better resilience than existing schemes. Instead of a random selection of these parame...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997