نتایج جستجو برای: algebraic generation
تعداد نتایج: 411247 فیلتر نتایج به سال:
We propose QTRU, a probabilistic and multi-dimensional public key cryptosystem based on the NTRU public key cryptosystem using quaternion algebra. QTRU encrypts four data vectors in each encryption session and the only other major difference between NTRU and QTRU is that the underlying algebraic structure has been changed to a non-commutative algebraic structure. As a result, QTRU inherits the ...
The concept of algebraic hyperstructures introduced by Marty as a generalization of ordinary algebraic structures. In an ordinary algebraic structure, the composition of two elements is an element, while in an algebraic hyperstructure, the composition of two elements is a set. The concept of ?-semihyperrings is a generalization of semirings, a generalization of semihyperrings and a generalizat...
The concept of self-similarity on subsets of algebraic varieties is defined by considering algebraic endomorphisms of the variety as `similarity' maps. Self-similar fractals are subsets of algebraic varieties which can be written as a finite and disjoint union of `similar' copies. Fractals provide a framework in which, one can unite some results and conjectures in Diophantine g...
Spend your few moment to read a book even only few pages. Reading book is not obligation and force for everybody. When you don't want to read, you can get punishment from the publisher. Read a book becomes a choice of your different characteristics. Many people with reading habit will always be enjoyable to read, or on the contrary. For some reasons, this computer methods for ordinary different...
Euler’s work on elliptic integrals is a milestone in the history of algebraic geometry. The founders of calculus understood that some algebraic functions could be integrated using elementary functions (logarithms and inverse trigonometric functions). Euler realized that integrating other algebraic functions leads to genuinely different functions, elliptic integrals. These functions are not some...
This paper explores the algebraic matching approach for detection of vulnerabilities in binary codes. The algebraic programming system is used for implementing this method. It is anticipated that models of vulnerabilities and programs to be verified are presented as behavior algebra and action language specifications. The methods of algebraic matching are based on rewriting rules and techniques...
The Neron-Severi group of divisor classes modulo algebraic equivalence on a smooth algebraic surface is often not difficult to calculate, and has classically been studied as one of the fundamental invariants of the surface. A more difficult problem is the determination of those divisor classes which can be represented by effective divisors; these divisor classes form a monoid contained in the N...
We describe powerful computational techniques, relying on linear algebraic methods,for generating ideals of non-linear invariants of algebraic hybrid systems. We show thatthe preconditions for discrete transitions and the Lie-derivatives for continuous evolu-tion can be viewed as morphisms, and so can be suitably represented by matrices. Wereduce the non-trivial invariant genera...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید