The Primitive Topology of a Scheme

نویسندگان

  • Mark E. Walker
  • Mark Walker
چکیده

We de ne a Grothendieck topology on the category of schemes whose associated sheaf theory coincides in many cases with the Zariski topology. We also give some indications of possible advantages this new topology has over the Zariski topology.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A BINARY LEVEL SET METHOD FOR STRUCTURAL TOPOLOGY OPTIMIZATION

This paper proposes an effective algorithm based on the level set method (LSM) to solve shape and topology optimization problems. Since the conventional LSM has several limitations, a binary level set method (BLSM) is used instead. In the BLSM, the level set function can only take 1 and -1 values at convergence. Thus, it is related to phase-field methods. We don’t need to solve the Hamilton-Jac...

متن کامل

A scheme over quasi-prime spectrum of modules

The notions of quasi-prime submodules and developed  Zariski topology was introduced by the present authors in cite{ah10}. In this paper we use these notions to define a scheme. For an $R$-module $M$, let $X:={Qin qSpec(M) mid (Q:_R M)inSpec(R)}$. It is proved that $(X, mathcal{O}_X)$ is a locally ringed space. We study the morphism of locally ringed spaces induced by $R$-homomorphism $Mrightar...

متن کامل

Comparison of three different numerical schemes for 2D steady incompressible lid-driven cavity flow

In this study, a numerical solution of 2D steady incompressible lid-driven cavity flow is presented. Three different numerical schemes were employed to make a comparison on the practicality of the methods. An alternating direction implicit scheme for the vorticity-stream function formulation, explicit and implicit schemes for the primitive variable formulation of governing Navier-Stokes equatio...

متن کامل

An efficient certificateless signcryption scheme in the standard model

Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...

متن کامل

A Deterministic Multiple Key Space Scheme for Wireless Sensor Networks via Combinatorial Designs

The establishing of a pairwise key between two nodes for encryption in a wireless sensor network is a challenging issue. To do this, we propose a new deterministic key pre-distribution scheme which has modified the multiple key space scheme (MKSS). In the MKSS, the authors define two random parameters to make better resilience than existing schemes. Instead of a random selection of these parame...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997