نتایج جستجو برای: ary homomorphism

تعداد نتایج: 8027  

Journal: :Journal of the Australian Mathematical Society. Series A. Pure Mathematics and Statistics 1989

Journal: :Journal of Siberian Federal University. Mathematics and Physics 2021

We discuss the construction of a long semi-exact Mayer–Vietoris sequence for homology any finite union open subspaces. This is used to obtain topological conditions representation integral meromorphic n-form on an n-dimensional complex manifold in terms Grothendieck residues. For such exist, it necessary that cycle integration separates set polar hypersurfaces form. The separation condition num...

Journal: :Indian Scientific Journal Of Research In Engineering And Management 2023

ABSTRACT In this article an attempt has been made to study some new algebraic structures of intuitionistic multi-anti fuzzy normal subgroups under homomorphism are discussed. Keywords Intuitionistic multi-fuzzy set (IMFS), subgroup (IMAFSG), (IMAFNSG). Mathematics Subject Classification 20N25, 03E72, 08A72, 03F55, 06F35, 03G25, 08A05

Journal: :Multiple-Valued Logic and Soft Computing 2009
Bijan Davvaz Wieslaw A. Dudek

The notion of an n-ary group is a natural generalization of the notion of a group and has many applications in different branches. In this paper, the notion of (normal) fuzzy n-ary subgroup of an n-ary group is introduced and some related properties are investigated. Characterizations of fuzzy n-ary subgroups are given.

1998
Jean-Claude Bermond Nausica Marlin David Peleg

This article investigates the problem of designing virtual di-paths (VPs) in a directed ATM model, in which the ow of information in the two directions of a link are not identical. On top of a given physical network we construct directed VPs. Routing in the physical network is done using these VPs. Given the capacity of each physical link (the maximum number of VPs that can pass through the lin...

Journal: :Discrete Mathematics & Theoretical Computer Science 2017
Jeffrey B. Remmel Sai-nan Zheng

In Bevan et al. (2016), the study of patterns in forests of binary shrubs was introduced. A k-ary heap H is a k-ary tree labeled with {1, . . . , n} such that every child has a larger label than its parent. Given a k-ary heap H , we associate a permutation σH with H by recording the vertex labels as they are encountered in the breadth-first search of the tree. For example, in Figure 1, we pictu...

2010
Sergei R. Sverchkov

In this paper we investigate the structure and representation of n-ary algebras arising from DNA recombination, where n is a number of DNA segments participating in recombination. Our methods involve a generalization of the Jordan formalization of observables in quantum mechanics in n-ary splicing algebras. We show that the splicing algebras are an n-ary envelope for algebras of DNA recombinati...

Journal: :CoRR 2007
Gregory Gutin Eun Jung Kim

For digraphs D and H , a mapping f : V (D)→V (H) is a homomorphism of D to H if uv ∈ A(D) implies f(u)f(v) ∈ A(H). For a fixed digraph H , the homomorphism problem is to decide whether an input digraph D admits a homomorphism to H or not, and is denoted as HOMP(H). Digraphs are allowed to have loops, but not allowed to have parallel arcs. A natural optimization version of the homomorphism probl...

Journal: :Discrete Applied Mathematics 2011
Tomás Feder Pavol Hell David G. Schell Juraj Stacho

Trigraph list homomorphism problems (also known as list matrix partition problems) have generated recent interest, partly because there are concrete problems that are not known to be polynomial time solvable or NP -complete. Thus while digraph list homomorphism problems enjoy dichotomy (each problem is NP -complete or polynomial time solvable), such dichotomy is not necessarily expected for tri...

2007
Levent Ertaul

In this paper we provide a new scheme to securely forward the message in wireless mobile ad hoc networks (MANETs) by using existing homomorphic encryption schemes. This scheme is an alternative for threshold cryptography (TC) in MANETs to securely forward the message. By using homomorphic encryption schemes we remove the computational cost associated with Lagrange Interpolation scheme used in T...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید