首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
The authors study the coincidence theory for pairs of maps from the Torus to the Klein bottle. Reidemeister classes and the Nielsen number are computed, and it is shown that any given pair of maps satisfies the Wecken property. The 1-parameter Wecken property is studied and a partial negative answer is derived. That is for all pairs of coincidence free maps a countable family of pairs of maps in the homotopy class is constructed such that no two members may be joined by a coincidence free homotopy.  相似文献   

2.
In the present paper, it is proved that the K0-group of a Toeplitz algebra on any connected domain is always isomorphic to the K0-group of the relative continuous function algebra. In addition, the cohomotopy groups of essential boundaries of some connected domains are computed, and the K0-groups of the continuous function algebras on these domains are also computed.  相似文献   

3.
A family of authentication codes with arbitration are constructed over projective spaces, the parameters and the probabilities of deceptions of the codes are also computed. In a special case, a perfect authentication code with arbitration is obtained.  相似文献   

4.
The concept of t-PBIB design was introduced by Wei Wandi and Yang Benfu as a generalization of G-design and PBIB design. In this paper, a number of 3-associntion schemes and 3-PBIB(2) designs are constructed on the bases of the finite vector space over Fq and the finite unitary geometry over Fq2. Then a number of 3-designs are constructed on the bases of the finite orthogonal geometries over Fq. The parameters of all these designs are computed.  相似文献   

5.
Let Dn be the generalized unit disk of degree n. In this paper, Riemannian metrics on the Siegel-Jacobi disk Dn × C(^m,n) which are invariant under the natural action of the Jacobi group are found explicitly and the Laplacians of these invariant metrics are computed explicitly. These are expressed in terms of the trace form.  相似文献   

6.
This paper derives some uniform convergence rates for kernel regression of some index functions that may depend on infinite dimensional parameter. The rates of convergence are computed for independent, strongly mixing and weakly dependent data respectively. These results extend the existing literature and are useful for the derivation of large sample properties of the estimators in some semiparametric and nonparametric models.  相似文献   

7.
利用GAP研究一般线性群的抛物子群   总被引:1,自引:0,他引:1  
A typical example for the algebraic groups is the general linear groups G = GL(n,F), we have studied the structure of such groups and paid special attention to its important substructures, namely the Parabolic subgroups.For a given G we computed all the Parabolic subgroups and determined their number, depending on the fact that any finite group has a composition series and the composition factors of a composition series are simple groups which are completely classified, we report here some investigations on the computed Parabolic subgroups. This has been done with the utility of GAP.  相似文献   

8.
利用有限域上一类幂零阵的标准形构造Cartesian认证码   总被引:1,自引:0,他引:1  
赵辉芳  秦德生 《东北数学》2004,20(4):415-423
Let Fq be a finite field. In this paper, a construction of Cartesian au-thentication codes from the normal form of a class of nilpotent matrices over the field Fq is presented. Moreover, assume that the encoding rules are chosen according to a uniform probability distribution, the probabilities PI and PS, of a successful im-personation attack and of a successful substitution attack respectively, of these codes are also computed.  相似文献   

9.
This paper is devoted to constructing an authentication code with arbitration using subspaces of vector spaces over finite fields.Moreover,if we choose the encoding rules of the transmitter and the decoding rules of the receiver according to a uniform probability distribution,then some parameters and the probabilities of successful attacks are computed.  相似文献   

10.
In this paper,the essential spectra of Toeplitz operators is discussed,and the K-theory of the Toeplitz algebra generated by {Tφ|φ∈C(iR)} is computed.In addition,the characteristic equation of Toeplitz operators is obtained and the algebraic properties of Toeplitz operators are discussed.  相似文献   

11.
Equivalent inherent rounding errors (E.I.R.E.) are defined as perturbations on the given data, such that the computed solution is the exact solution of the problem with perturbed data. Almost minimal E.I.R.E. are computed for solutions of consistent sets of linear equations (with one or more right hand sides). Non consistent sets are also treated, but their computed E.I.R.E. cannot be proven almost minimal in all cases.  相似文献   

12.
利用有限域上酉几何构作一类新的带仲裁的认证码,并且计算了所构作认证码的参数以及各种攻击成功的概率.  相似文献   

13.
韩明 《运筹与管理》2001,10(2):93-98
本应用失效树分析法,以某型工程车进行了可靠性分析,建立了该系统的失效树,在此基础上用最小割集法和系统失效树的可靠性仿真法计算了该系统的可靠性参数,并对一些结果进行了比较。  相似文献   

14.
利用有限域上奇异伪辛几何构作了一个新的具有仲裁的认证码,计算了这个码的参数,当发方编码规则和收方解码规则按等概率分布选取时,计算出各种攻击成功的概率.  相似文献   

15.
利用辛对合矩阵构造Cartesian认证码   总被引:1,自引:0,他引:1  
利用辛对合矩阵构作了一个C artesian认证码,并且计算了其参数.假设编码规则是按均匀概率分布选取时,计算了模仿攻击成功的概率PI和替换攻击成功的概率PS.  相似文献   

16.
A collision integral is constructed taking into account the rotational degrees of freedom of the gas molecules. Its truncation error is shown to be second order in the rotational velocity mesh size. In the solution of the kinetic equation, the resulting collision integral is directly computed using a projection method. Preliminarily, the differential scattering cross sections of nitrogen molecules are computed by applying the method of classical trajectories. The resulting cross section values are tabulated in multimillion data arrays. The one-dimensional problems of shock wave structure and heat transfer between two plates are computed as tests, and the results are compared with experimental data. The convergence of the results with decreasing rotational velocity mesh size is analyzed.  相似文献   

17.
§1.IntroductionLetS,EandMbethreenon-emptyfinitesetsandletf:S×E→Mbeamap.Thefourtuple(S,E,M;f)iscaledanauthenticationcode(see[1...  相似文献   

18.
Straightforward solution of discrete ill-posed least-squares problems with error-contaminated data does not, in general, give meaningful results, because propagated error destroys the computed solution. Error propagation can be reduced by imposing constraints on the computed solution. A commonly used constraint is the discrepancy principle, which bounds the norm of the computed solution when applied in conjunction with Tikhonov regularization. Another approach, which recently has received considerable attention, is to explicitly impose a constraint on the norm of the computed solution. For instance, the computed solution may be required to have the same Euclidean norm as the unknown solution of the error-free least-squares problem. We compare these approaches and discuss numerical methods for their implementation, among them a new implementation of the Arnoldi–Tikhonov method. Also solution methods which use both the discrepancy principle and a solution norm constraint are considered.  相似文献   

19.
利用有限域上反对称矩阵的标准型构作卡氏认证码   总被引:1,自引:0,他引:1  
周琦  王登银 《数学研究》2004,37(1):42-47
利用有限域上反对称矩阵的标准型构作了一个迪卡尔认证码并计算出该码的所有参数. 进而,假定编码规则按照统一的概率分布所选取,该码的成功伪造与成功替换的最大概率PI与PS亦被计算出来.  相似文献   

20.
利用奇、偶特征有限域上的正交几何构作出一类C artesian认证码,并且计算了它们的参数.并在假定按照等概率分布来选择编码规则下,求出了认证码的成功的模仿攻击概率和成功的替换攻击概率.作为一个推论,还得到了一些最优的C artesian认证码.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号