首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
    
Yujiao Sun 《代数通讯》2018,46(11):5032-5052
  相似文献   

2.
李长稳  黄建红  胡滨 《数学研究》2011,44(3):319-324
称群G的一个子群H在G中弱ss-置换的,如果存在G的一个次正规子群T和包含在H中的G的一个ss-置换子群Hss使得G=HT且H∩T≤Hss.利用子群的弱ss-置换性得到了有限p-幂零群的一些新的刻画.  相似文献   

3.
Let U be a Sylow p-subgroup of the finite Chevalley group of type D4 over the field of q elements, where q is a power of a prime p. We describe a construction of the generic character table of U.  相似文献   

4.
非极大交换子群皆正规的有限群   总被引:1,自引:0,他引:1  
设H是有限群G的一个交换子群.如果H在G中的中心化子正是它本身,则称H为G的极大交换子群.本文主要研究每一非极大交换子群都正规的有限群的结构,对这类有限群给出其完全分类.  相似文献   

5.
6.
We obtain formulac and estimates for character sums of the type S(x,f,p^m)=∑x=1^p^mx(f(f)),where p^m is a prime power with m≥2,x is a multiplicative character(mod p^m),and f=f1/f2 is a rational function over Z.In particular,if p is odd,d=deg(f1) deg(f2) and d^*=max(deg(f1),deg(f2)) then we obtain |S(x,f,p^m)|≤(d-1)p^m(1-1/d^*) for any non-constant f (mod p) and primitive character x.For p=2 an extra factor of 2√2 is needed.  相似文献   

7.
本文给出了有限交换局部环R上无限线性群GL(R)=∪nGLnR的Sylowp-子群的形式.令M是有限交换局部环R的唯一极大理想,k=R/M为R的剩余类域.用X(k)表示k的特征,并假定P与x(k)互素.作者证明了:GL(R)的任一Sylowp-子群S或者同构于的可数无限直积与P(j)的无限直积的直积(当P≠2或P=2,X(k)β≡1(mod4))或者同构于Pi的无限直积与P(j)的无限直积的直积(当P=2,X(k)β≡3(mod4)),这里,只是GL(epi)R(分别地,GL(2ri)R)的Sylowp-子群,P(j))同构于P=∪i∈Ipi,I是可数集.  相似文献   

8.
    
Dan Levy 《代数通讯》2013,41(11):4144-4154
Let G be a finite group, and let p 1,…, p m be the distinct prime divisors of |G|. Given a sequence 𝒫 =P 1,…, P m , where P i is a Sylow p i -subgroup of G, and g ∈ G, denote by m 𝒫(g) the number of factorizations g = g 1g m such that g i  ∈ P i . Previously, it was shown that the properly normalized average of m 𝒫 over all 𝒫 is a complex character over G termed the Average Sylow Multiplicity Character. The present article identifies the kernel of this character as the subgroup of G consisting of all g ∈ G such that m 𝒫(gx) = m 𝒫(x) for all 𝒫 and all x ∈ G. This result implies a close connection between the kernel and the solvable radical of G.  相似文献   

9.
通过Sylow子群的极大子群和次正规性,利用极小阶反例的方法,得出群p-幂零性和超可解性的结论.本文的创新改进之处在于结合Sylow子群的极大子群和次正规性,研究p-幂零性和超可解性的相关结论.  相似文献   

10.
We establish the upper bound

with a prime and any positive integer, the sum being over all nonprincipal multiplicative characters .

  相似文献   


11.
For any integersa 1,a 2,a 3,a 4 andc witha 1 a 2 a 3 a 4≢0(modp), this paper shows that there exists a solutionX=(x 1,x 2,x 3,x 4) ∈Z 4 of the congruencea 1 x 1 2 +a 2 x 2 2 +a 3 x 3 2 +a 4 x 4 2c(modp) such that
Research of Zheng Zhiyong is supported by NNSF Grant of China. He would also like to thank the first author and the Mathematics Department of Kansas, State University for their hospitality and support.  相似文献   

12.
    
We use a new argument to improve the error term in the asymptotic formula for the number of Diophantine m-tuples in finite fields, which is due to A. Dujella and M. Kazalicki (2021) and N. Mani and S. Rubinstein-Salzedo (2021).  相似文献   

13.
The notion of pseudo-randomness of subsets of \({\mathbb Z_n}\) is defined, and the measures of pseudo-randomness are introduced. Then a construction (based on the use of hybrid character sums) will be presented for subsets of \({\mathbb Z_p}\) with strong pseudo-random properties.  相似文献   

14.
We combine exponential sums, character sums and Fourier coefficients of automorphic forms to improve the best known upper bound for the lattice error term associated to rational ellipsoids.  相似文献   

15.
16.
17.
    
Relative generalized Hamming weights (RGHWs) of a linear code with respect to a linear subcode determine the security of the linear ramp secret sharing scheme based on the linear codes. They can be used to express the information leakage of the secret when some keepers of shares are corrupted. Cyclic codes are an interesting type of linear codes and have wide applications in communication and storage systems. In this paper, we investigate the RGHWs of cyclic codes of two nonzeros with respect to its irreducible cyclic subcodes. We give two formulae for RGHWs of the cyclic codes. As applications of the formulae, explicit examples are computed. Moreover, RGHWs of cyclic codes in the examples are very large, comparing with the generalized Plotkin bound of RGHWs. So it guarantees very high security for the secret sharing scheme based on the dual codes.  相似文献   

18.
The authors have recently introduced and studied a modification of the classical number theoretic question about the largest gap between consecutive quadratic non-residues and primitive roots modulo a prime pp, where the distances are measured in the Hamming metric on binary representations of integers. Here we continue to study the distribution of such gaps. In particular we prove the upper bound
?p≤(0.117198…+o(1))logp/log2?p(0.117198+o(1))logp/log2
for the smallest Hamming weight ?p?p among prime quadratic non-residues modulo a sufficiently large prime pp. The Burgess bound on the least quadratic non-residue only gives ?p≤(0.15163…+o(1))logp/log2?p(0.15163+o(1))logp/log2.  相似文献   

19.
The main purpose of this paper is using the mean value theorem of Dirichlet L-function and the estimates for character sums to study the asymptotic properties of a hybrid mean value of Kloosterman sums with the weight of Hurwitz zeta-function and the Cochrane sums, and give an interesting mean value formula for it.  相似文献   

20.
A new algebraic Cayley graph is constructed using finite fields. It provides a more flexible source of expander graphs. Its connectedness, the number of connected components, and diameter bound are studied via Weil's estimate for character sums. Furthermore, we study the algorithmic problem of computing the number of connected components and establish a link to the integer factorization problem.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号