On the Length of Binary Forms
نویسنده
چکیده
The K-length of a form f in K[x1, . . . , xn], K ⊂ C, is the smallest number of d-th powers of linear forms of which f is a K-linear combination. We present many results, old and new, about K-length, mainly in n = 2, and often about the length of the same form over different fields. For example, the K-length of 3x − 20xy + 10xy is three for K = Q( √ −1), four for K = Q( √ −2) and five for K = R.
منابع مشابه
A two-sided Bernoulli-based CUSUM control chart with autocorrelated observations
Usually, in monitoring a proportion p < /em>, the binary observations are considered independent; however, in many real cases, there is a continuous stream of autocorrelated binary observations in which a two-state Markov chain model is applied with first-order dependence. On the other hand, the Bernoulli CUSUM control chart which is not robust to autocorrelation can be applied two-sided co...
متن کاملA Thermodynamic Study of Complex Formation between 15-Crown-5 with Mg2+, Ca2+, Sr2+ and Ba2+ in Acetonitrile Methanol Binary Mixtures Using Conductometric Method
The complexation reactions between Mg2+, Ca2+, Sr2+ and Ba2+ metal cations with 15-crown-5 (15C5) were studied in acetonitrile (AN)-methanol (MeOH) binary mixtures at different temperatures using conductometric method. 15C54 forms 1:1 complexes with Mg2+, Ca2+ and Sr2+ cations in solutions. The Ma2+ cati...
متن کاملA Novel Noise-Robust Texture Classification Method Using Joint Multiscale LBP
In this paper we describe a novel noise-robust texture classification method using joint multiscale local binary pattern. The first step in texture classification is to describe the texture by extracting different features. So far, several methods have been developed for this topic, one of the most popular ones is Local Binary Pattern (LBP) method and its variants such as Completed Local Binary...
متن کاملSemiotics of Power and Knowledge in Nasir Khusrow's Travelogue
Nasir Khosrow embarks upon a seven year journey in order to come to terms with his spiritual crisis. The quest was the inevitable outcome of the tensions and conflicts between Nasir and the institutionalized forms of power and knowledge. The tensions lead to the formation of a series of binary oppositions—verbal and nonverbal—within the text of his travelogue. The researchers have analyzed the ...
متن کاملReverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
متن کاملIdentification of bovine, ovine and caprine pure and binary mixtures of raw and heat processed meats using species specific size markers targeting mitochondrial genome
A specific polymerase chain reaction (PCR) method was applied for identification of bovine (Bos taurus), ovine (Ovis aries) and caprine (Capra hircus) pure and binary mixtures of raw and heat-processed meats. These meats are used in food industry products and/or for direct consumption of consumers. The mitochondrial DNA was amplified as a template in a PCR reaction by use of specific primers re...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010