نتایج جستجو برای: supersingular elliptic curves
تعداد نتایج: 120919 فیلتر نتایج به سال:
Multicarrier code-division multiple-access is one of the effective techniques to gain its multiple access capability, robustness against fading, and to mitigate the ISI.In this paper, we propose an improved mulcarrier CDMA system with adaptive subchannel allocation. We analyzed the performance of our proposed system in frequency selective fading environment with narrowband interference existing...
The speech signal conveys information about the identity of the speaker. The area of speaker identification is concerned with extracting the identity of the person speaking the utterance. As speech interaction with computers becomes more pervasive in activities such as the telephone, financial transactions and information retrieval from speech databases, the utility of automatically identifying...
Steganography is the art of hiding and transmitting data through apparently innocuous carriers in an effort to conceal the existence of the data. A lot of steganography algorithms have been proposed recently. Many of them use the digital image data as a carrier. In data hiding scheme of halftoning and coordinate projection, still image data is used as a carrier, and the data of carrier image ar...
Machine Translation, (hereafter in this document referred to as the "MT") faces a lot of complex problems from its origination. Extracting multiword expressions is also one of the complex problems in MT. Finding multiword expressions during translating a sentence from English into Urdu, through existing solutions, takes a lot of time and occupies system resources. We have designed a simple rela...
For public key cryptosystems multiplication on elliptic curves can be used instead of exponentiation in finite fields. One attack to such a system is: embedding the elliptic curve group into the multiplicative group of a finite field via weilpairing; calculating the discrete logarithm on the curve by solving the discrete logarithm in the finite field. This attack can be avoided by constructing ...
Ensemble learning algorithms such as AdaBoost and Bagging have been in active research and shown improvements in classification results for several benchmarking data sets with mainly decision trees as their base classifiers. In this paper we experiment to apply these Meta learning techniques with classifiers such as random forests, neural networks and support vector machines. The data sets are ...
This paper proposes a neural network weights and topology optimization using genetic evolution and the backpropagation training algorithm. The proposed crossover and mutation operators aims to adapt the networks architectures and weights during the evolution process. Through a specific inheritance procedure, the weights are transmitted from the parents to their offsprings, which allows re-explo...
The Main Conjecture of Iwasawa theory for an elliptic curve E over Q and the anticyclotomic Zp-extension of an imaginary quadratic field K was studied in [BD2], in the case where p is a prime of ordinary reduction for E. Analogous results are formulated, and proved, in the case where p is a prime of supersingular reduction. The foundational study of supersingular main conjectures carried out by...
We prove a higher dimensional generalization of Gross and Zagier’s theorem on the factorization of differences of singular moduli. Their result is proved by giving a counting formula for the number of isomorphisms between elliptic curves with complex multiplication by two different imaginary quadratic fields K and K′, when the curves are reduced modulo a supersingular prime and its powers. Equi...
For positive integers 1 ≤ i ≤ k, we consider the arithmetic properties of quotients of Wronskians in certain normalizations of the Andrews-Gordon q-series ∏ 1≤n6≡0,±i (mod 2k+1) 1 1− qn . This study is motivated by their appearance in conformal field theory, where these series are essentially the irreducible characters of (2, 2k + 1) Virasoro minimal models. We determine the vanishing of such W...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید