نتایج جستجو برای: perfect rings
تعداد نتایج: 94317 فیلتر نتایج به سال:
A linear (qd, q, t)-perfect hash family of size s in a vector space V of order qd over a field F of order q consists of a set φ1, . . . , φs of linear functionals from V to F with the following property: for all t subsets X ⊆ V there exists i ∈ {1, . . . , s} such that φi is injective when restricted to F . A linear (qd, q, t)-perfect hash family of minimal size d(t− 1) is said to be optimal. I...
Super-simple designs are useful in constructing codes and designs such as superimposed codes and perfect hash families. Recently, Gronau et al determined the existence of super-simple (v, 5, 2)-BIBDs with possible exceptions of v ∈ {75, 95, 115, 135, 195, 215, 231, 285, 365, 385, 515}. In this article, we investigate the existence of a super-simple (v, 5, 4)-BIBD and show that such a design exi...
We present two new perfect hashing schemes that can be used for efficient bitboard move generation for sliding pieces in chess-like board games without the need to use rotated bitboards. Moreover, we show that simple variations of these schemes give minimal perfect hashing schemes. The new method is applicable provided N , the number of k-bit spaced positions that may be set to 1, is not more t...
Helicenes combine two central themes in chemistry: extended π-conjugation and chirality. Hetero-atom doping preserves both characteristics allows modulation of the electronic structure a helicene. Herein, we report (BO)2-doped tetrathia[7]helicene 1, which was prepared from 2-methoxy-3,3′-bithiophene four steps. 1 is formally derived by substituting (Mes)B−O moieties place (H)C=C(H) fragments b...
Shine a flashlight on a black hole, and one is greeted with the return of a series of concentric rings of light. For a point source of light, and for perfect alignment of the lens, source, and observer, the rings are of infinite brightness (in the limit of geometric optics). In this manner, distant black holes can be revealed through their reflection of light from the Sun. Such retro-MACHO even...
We use a K-theory recipe of Thomason to obtain classi cations of triangulated subcategories via re ning some standard thick subcategory theorems. We apply this recipe to the full subcategories of nite objects in the derived categories of rings and the stable homotopy category of spectra. This gives, in the derived categories, a complete classi cation of the triangulated subcategories of perfect...
In this paper we establish the existence of S-idempotents in case of loop rings ZtLn(m) for a special class of loops Ln(m); over the ring of modulo integers Zt for a specific value of t. These loops satisfy the conditions g i for every gi ∈ Ln(m). We prove ZtLn(m) has an S-idempotent when t is a perfect number or when t is of the form 2p or 3p (where p is an odd prime) or in general when t = p1...
We study Gorenstein dimension and grade of a module M over a filtered ring whose assosiated graded ring is a commutative Noetherian ring. An equality or an inequality between these invariants of a filtered module and its associated graded module is the most valuable property for an investigation of filtered rings. We prove an inequality G-dimM ≤ G-dimgrM and an equality gradeM = grade grM , whe...
In 2014, Peikert described the first practical lattice-based key exchange that is provably secure and provides perfect forward security. However, his presentation lacks concrete proposals for parameters. We aim to provide a clear description of how the algorithm can be implemented along with some analysis for potential parameters. Previously in 2015, Singh considered the simpler case, as chosen...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید