The Critical Groups of the Peisert Graphs

نویسنده

  • PETER SIN
چکیده

The critical group of a finite graph is an abelian group defined by the Smith normal form of the Laplacian. We determine the critical groups of the Peisert graphs, a certain family of strongly regular graphs similar to, but different from, the Paley graphs. It is further shown that the adjacency matrices of the two graphs defined over a field of order p2 with p ≡ 3 (mod 4) are similar over the `-local integers for every prime `. Consequently, each such pair of graphs provides an example where all the corresponding generalized adjacency matrices are both cospectral and equivalent in the sense of Smith normal form.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs

To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...

متن کامل

The Effects of Concept Mapping and Critical Thinking Test Strategies on EFL Iranian Learners' Reading Comprehension

This research was designed to investigate the effects of critical thinking and concept mappingtest strategies on EFL Iranian learners' reading comprehension in five sessions during near twomonths. Fifty eight male and female students took a pre-test as a language proficiency test first,then they were randomly assigned to two experimental groups and a control group, twentystudents for critical t...

متن کامل

A Iterative Analysis to Improve Key Properties of Critical Human-Intensive Processes: An Election Security Example

Leon J. Osterweil, University of Massachusetts Amherst Matt Bishop, University of California at Davis Heather M. Conboy, University of Massachusetts Amherst Huong Phan, University of Massachusetts Amherst Borislava I. Simidchieva, University of Massachusetts Amherst and Raytheon BBN Technologies George S. Avrunin, University of Massachusetts Amherst Lori A. Clarke, University of Massachusetts A...

متن کامل

An Ant Colony Optimization Algorithm for Network Vulnerability Analysis

Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...

متن کامل

Designs from Paley Graphs and Peisert Graphs

Fix positive integers p, q, and r so that p is prime, q = p, and q ≡ 1 (mod 4). Fix a graph G as follows: If r is odd or p 6≡ 3 (mod 4), let G be the qvertex Paley graph; if r is even and p ≡ 3 (mod 4), let G be either the q-vertex Paley graph or the q-vertex Peisert graph. We use the subgraph structure of G to construct four sequences of 2-designs, and we compute their parameters. Letting k4 d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017