نتایج جستجو برای: subset
تعداد نتایج: 100145 فیلتر نتایج به سال:
suppose $g$ is a finite group, $a$ and $b$ are conjugacy classes of $g$ and $eta(ab)$ denotes the number of conjugacy classes contained in $ab$. the set of all $eta(ab)$ such that $a, b$ run over conjugacy classes of $g$ is denoted by $eta(g)$.the aim of this paper is to compute $eta(g)$, $g in { d_{2n}, t_{4n}, u_{6n}, v_{8n}, sd_{8n}}$ or $g$ is a decomposable group of order $2pq$, a group of...
In this paper, we extend the construction of a fuzzy subgroup generated by a fuzzy subset to $L$-setting. This construction is illustrated by an example. We also prove that for an $L$-subset of a group, the subgroup generated by its level subset is the level subset of the subgroup generated by that $L$-subset provided the given $L$-subset possesses sup-property.
a finite group g is said to be a pos-group if for each x in g the cardinality of the set {y in g | o(y) = o(x)} is a divisor of the order of g. in this paper we study the structure of pos-groups with some cyclic sylow subgroups.
a finite group g is said to be a pos-group if for each x in g the cardinality of the set {y in g | o(y) = o(x)} is a divisor of the order of g. in this paper we study the structure of pos-groups with some cyclic sylow subgroups.
in this paper, we extend the construction of a fuzzy subgroup generated by a fuzzy subset to $l$-setting. this construction is illustrated by an example. we also prove that for an $l$-subset of a group, the subgroup generated by its level subset is the level subset of the subgroup generated by that $l$-subset provided the given $l$-subset possesses sup-property.
A division property is a generic tool to search for integral distinguishers, and automatic tools such as MILP or SAT/SMT allow us evaluate the propagation efficiently. In application stream ciphers, it enables estimate security of cube attacks theoretically, leads best key-recovery against well-known ciphers. However, was reported that some based on degenerate distinguishing due inaccuracy prop...
we introduce center-like subsets z*(r,f), z**(r,f) and z1(r,f), where r is a ring and f is a map from r to r. for f a derivation or a non-identity epimorphism and r a suitably-chosen prime or semiprime ring, we prove that these sets coincide with the center of r.
let $r$ be a commutative ring with identity and $m$ be an$r$-module. let $fspec(m)$ denotes the collection of all prime fuzzysubmodules of $m$. in this regards some basic properties of zariskitopology on $fspec(m)$ are investigated. in particular, we provesome equivalent conditions for irreducible subsets of thistopological space and it is shown under certain conditions$fspec(m)$ is a $t_0-$spa...
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید