نتایج جستجو برای: n v ring
تعداد نتایج: 1307350 فیلتر نتایج به سال:
Let V be a smooth, projective, convex variety. We define tautological ψ and κ classes on the moduli space of stable maps M0,n(V ), give a (graphical) presentation for these classes in terms of boundary strata, derive differential equations for the generating functions of the Gromov-Witten invariants of V twisted by these tautological classes, and prove that these intersection numbers are comple...
فرض کنید g = (v,e) یک گراف ساده باشد. مجموعه ی s? v را اتحاد تهاجمی گوییم، هرگاه برای هر راس در s n(s) ? داشته باشیم |n[v] ?s|?|n[v]?s|. همچنین s را یک اتحاد تهاجمی فراگیر گوییم، هرگاه شرط فوق برای هر راس در v ?s برقرار باشد. یافتن یک اتحاد تهاجمی فراگیر در گراف، یک مساله ی np-سخت است. بنابراین برای به دست آوردن پارامترهای اتحاد تهاجمی فراگیر یعنی ?_o (g) و ?_o ? (g)، نیاز داریم تا کرانهایی برح...
We study (1 + 2v)-constacyclic codes over R + vR and their Gray images, where v + v = 0 and R is a finite chain ring with maximal ideal and nilpotency index e. It is proved that the Gray map images of a (1 + 2v)-constacyclic codes of length n over R + vR are distance-invariant linear cyclic codes of length 2n over R. The generator polynomials of this kind of codes for length n are determined,...
Let V be a smooth, projective, convex variety. We define tautological ψ and κ classes on the moduli space of stable maps M0,n(V ), give a (graphical) presentation for these classes in terms of boundary strata, derive differential equations for the generating functions of the Gromov-Witten invariants of V twisted by these tautological classes, and prove that these intersection numbers are comple...
Let V be a smooth, projective, convex variety. We define tautological ψ and κ classes on the moduli space of stable maps M0,n(V ), give a (graphical) presentation for these classes in terms of boundary strata, derive differential equations for the generating functions of the Gromov-Witten invariants of V twisted by these tautological classes, and prove that these intersection numbers are comple...
In this paper, we introduce the new notion of n-f-clean rings as a generalization of f-clean rings. Next, we investigate some properties of such rings. We prove that $M_n(R)$ is n-f-clean for any n-f-clean ring R. We also, get a condition under which the denitions of n-cleanness and n-f-cleanness are equivalent.
The concept of multivariate bijective map of an affine space K over commutative Ring K was already used in Cryptography. We consider the idea of nonbijective multivariate polynomial map Fn of K n into K represented as ”partially invertible decomposition” F (1) n F (2) n . . . F (k) n , k = k(n), such that knowledge on the decomposition and given value u = F (v) allow to restore a special part v...
0.1. Related results. Krstić-McCool proved that GL3(A) is not finitely presented if there is an epimorphism from A to F [t] for some field F [Krs-Mc]. Suslin proved that SLn(A[t1, . . . , tk]) is generated by elemetary matrices if n ≥ 3, A is a regular ring, and K1(A) ∼= A× [Su]. GrunewaldMennicke-Vaserstein proved that Sp2n(A[t1, . . . , tk]) is generated by elementary matrices if n ≥ 2 and A ...
An artended IEEE 802.5 protocol suitable for transmitting time consh-dm'ed messages in real time token ring fibre optic local area networks has been proposed and analysed for its performance subsequently. It differs from the tmhtional token ring protocols as time COIlstraints of messages are i n v t e d explicitly. In this protocol, the laxities of messages are mapped into priorities. The messa...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید