نتایج جستجو برای: quarter square algebraic identity

تعداد نتایج: 319788  

Journal: :Theor. Comput. Sci. 2000
Bruce E. Litow

A series all of whose coeecients have unit modulus is called an Hadamard square root of unity. We investigate and partially characterise the algebraic Hadamard square roots of unity. The investigation makes use of a result about the asymptotic behavior of the coeecients of algebraic series and the Weyl-von Neumann theorem.

Journal: :Journal of the Australian Mathematical Society 1976

Journal: :Australasian J. Combinatorics 1997
Roger B. Eggleton R. Jaime Simpson

We consider local and global combinatorial constraints on embeddings of a simple closed curve in a rectangular array of unit squares in which the curve lies entirely within the rectangular array and passes through each unit square once. Geographical terminology is convenient to describe the embeddings. We study shortest segments of the embedded curve with no clockwise quarter turns (bays) and a...

Journal: :Journal of Student Research 2022

The adolescent stage of development involves wide-scale neurological growth, thus allowing for a considerable emergence mental health disorder symptoms, stemming from imbalances within the brain. Identity formation is significant factor in maturation; however, rapid can result small-scale identity crises. Lack support teenager’s environment lead to discrepancies between their self-concept and s...

2011
Malte Beecken Johannes Mittmann Nitin Saxena

Algebraic independence is a fundamental notion in commutative algebra that generalizes independence of linear polynomials. Polynomials {f1, . . . , fm} ⊂ K[x1, . . . , xn] (over a field K) are called algebraically independent if there is no non-zero polynomial F such that F (f1, . . . , fm) = 0. The transcendence degree, trdeg{f1, . . . , fm}, is the maximal number r of algebraically independen...

Journal: :Journal of cognitive neuroscience 2005
Gilles Pourtois Sophie Schwartz Mohamed L. Seghier François Lazeyras Patrik Vuilleumier

Humans can identify individual faces under different viewpoints, even after a single encounter. We determined brain regions responsible for processing face identity across view changes after variable delays with several intervening stimuli, using event-related functional magnetic resonance imaging during a long-term repetition priming paradigm. Unfamiliar faces were presented sequentially eithe...

1992
Arend Rensink

We deene families of posets, ordered by preexes, as the counterpart of the usual families of conngurations ordered by subsets. On these objects we deene two types of morphism: event and order morphisms, resulting in categories FPos and FPos v. We then show the following: { Families of posets, in contrast to families of conngurations, are always prime algebraic; in fact the category FPos v is eq...

Journal: :Theor. Comput. Sci. 2014
Guomin Yang Chik How Tan Yi Mu Willy Susilo Duncan S. Wong

Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on number-theoretic hard problems such as Discrete Log and Factorization. This paper focuses on the design and analysis of identity based identi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید